Hackers use a variety of tools to attack a system. Each of the tools we cover in this article have distinct capabilities. We describe the most popular tools from each of the following categories:
■ Port scanners
■ Vulnerability scanners
Later in this article, we use some of these tools in realistic scenarios to demonstrate how easily even a novice hacker or script-kiddie can gain access to an unsecured system.