Exploiting networks is often a technique that comes in handy. Often, we may find that the most vulnerable point in a corporate is in the network itself. In this chapter, you will learn about some of the ways to successfully exploit the services we find while scanning a network during a pentest activity.