Figure 6

Figure 6: Selecting the attack interface.