Breaching the External Network Security Perimeter