Network Fingerprinting and Exploitation