Network Infiltration