ABSTRACT
The state-of-the-art in computer attack tools and techniques is rapidly advancing. Yes, we still face
the tried-and-true, decades-old arsenal of traditional computer attack tools, including denial-
of-service attacks, password crackers, port scanners, sniffers, and RootKits. However, many of
these basic tools and techniques have seen a renaissance in the past couple of years, with new
features and underlying architectures that make them more powerful than ever. Attackers are
delving deep into widely used protocols and the very hearts of our operating systems. In addition to
their growing capabilities, computer attack tools are becoming increasingly easy to use. Just when
you think you have seen it all, a new and easy-to-use attack tool is publicly released with a feature
that blows your socks off. With this constant increase in the sophistication and ease of use in attack
tools, as well as the widespread deployment of weak targets on the Internet, we now live in the
golden age of hacking.