ABSTRACT
Recent headlines demonstrate that the latest crop of hacker
tools and techniques can be highly damaging to an organi-
zation’s sensitive information and reputation. With the rise
of powerful, easy-to-use, and widely distributed hacker
tools, many in the security industry have observed that
today is the golden age of hacking. The purpose of this
entry is to describe the tools in widespread use today
for compromising computer and network security.
Additionally, for each tool and technique described, the
entry presents practical advice on defending against each
type of attack.