ABSTRACT

Recent headlines demonstrate that the latest crop of hacker tools and techniques can be highly

damaging to an organization’s sensitive information and reputation. With the rise of powerful, easy-

to-use, and widely distributed hacker tools, many in the security industry have observed that today

is the golden age of hacking. The purpose of this chapter is to describe the tools in widespread use

today for compromising computer and network security. Additionally, for each tool and technique

described, the chapter presents practical advice on defending against each type of attack.