Which of the following attacks does this describe?