Figure 6.4
Network diagram created by
attacker using ping and traceroute