Chapter 1: Bypassing Network Access Control