Chapter 4: Advanced Network Attacks