Fig 7.1
Searching Packet Storm for a common vulnerability exploit