1. Search the Web for three tools that can be used by security administrators, network administrators, and attackers alike.
2. Using a Web browser and the names of the tools you found, find a site that claims to be dedicated to supporting hackers.
3. Do you find any references to other hacker tools? If you do, create a list of the tools along with a short descriiption of what the tools do and how the tools work.
***Please include a minimum of 6 peer-reviewed or academic resources, in-text citation, introduction & conclusion, write in paragraphs not bullet points. Thank you!