Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)