This chapter covered the tools, files, and programs commonly used when hacking. We also went into some of the better papers available for free on the Internet that complement what is in this book.