The following exploit code is extracted from what kind of attack?