In this chapter we will discuss in brief some of various tools that are widely used to prevent hacking and getting unauthorized access to a computer network. Check www.metasploit.com. If you liked it dont forget to send your reviews telling us how you feel about our sessions, thank you.❤️