Processing 4 3 3 Attacking Patterns