
Right around the recipe I'd be using were I of the black hat bent. At least one level, if not several when possible, of indirection would be #1 on my list of things to do. I do hope everyone pays attention that doing this complicates that pesky attribution problem when it comes to pwning other's systems.