Step 3 plus

Example from the workbook step 3 plus (page 25).
Exploiting vulnerability: A