Cross Layer Attacks and How to Use Them for DNS Cache Poisoning, Device Tracking and More