how hackers move through networks