Assessing and Exploiting
Control Network Captures