Chapter 8   
Phase3: Gaining Access Using Network Attacks