The Anatomy of a Compromised Network (Part 1)