Chapter 8
Phase3: Gaining Access Using
Network Attacks