1.6 Attack Methods & Vectors