Lists five tools that can be used by security administrators, network administrators, and attackers alike.
Search the Web for three to five other tools that fit this description.
Using a Web browser and the names of the tools you found, find a site that claims to be dedicated to supporting hackers.
Do you find any references to other hacker tools?
If you do, create a list of the tools along with a short description of what the tools do and how the tools work.