thumbnail Investigating Intrusions From Intriguing Exploits