3.5 Solutions [Iterative Attacks]