3. The “Impossible” Payload Hack