Figure 6.21 A fragment overlap attack