Figure 6.4  Network diagram created by attacker using ping and traceroute