ABSTRACT
Recent headlines demonstrate that the latest crop of hacker tools and techniques can be highly
damaging to an organization’s sensitive information and reputation. With the rise of powerful, easy-
to-use, and widely distributed hacker tools, many in the security industry have observed that today
is the golden age of hacking. The purpose of this chapter is to describe the tools in widespread use
today for compromising computer and network security. Additionally, for each tool and technique
described, the chapter presents practical advice on defending against each type of attack.