A Penetration Attack Reconstructed