VoIP Network Security: How a Hacker Took Advantage of Vulnerabilities