Problem
• Lists five tools that can be used by security administrators, network administrators, and attackers alike.
• Search the Web for three to five other tools that fit this description.
• Using a Web browser and the names of the tools you found, find a site that claims to be dedicated to supporting hackers.
• Do you find any references to other hacker tools?
• If you do, create a list of the tools along with a short description of what the tools do and how the tools work.
The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.