Mapping Mesh Infrastructure and Protocol Hijacking