Figure 10

Figure 10: Intruder with username/password selected.