Fig 7.1  Searching Packet Storm for a common vulnerability exploit