Tools that can be used by security administrators, network administrators, and attackers alike.
Lists five tools that can be used by security administrators, network administrators, and attackers alike. In a 3-4 page paper not including a title and reference page do the following;
● Search the Web for three to five other tools that fit this description.
● Using a Web browser and the names of the tools you found, find a site that claims to be dedicated to supporting hackers.
● Do you find any references to other hacker tools?
○ If you do, create a list of the tools along with a short description of what the tools do and how the tools work.
(Whitman, M. E., & Mattord, H. J. (2019). Management of information security (6th ed.) Cengage Learning
Print ISBN: 978-1337405713
eText ISBN: 978-1337671545