Exploiting Networking Infrastructure