Figure 11

Figure 11: The Google Analytics attack is complete with a user guide to get you started.