Once again, we have used the popular Hacking Exposed format for the fifth edition; every attack technique is highlighted in the margin like this: