2) We present the same attack with more solutions in "Practical Unix & Internet Security" in 1996. See pp. 769-771.
Sometimes, a day hacking at the keyboard obviates the need to spend 15 minutes with a reference book.