6 ways hackers get in

Attackers use the same tools in attacks that pen testers use to test. Six sample vulnerabilities and exploits.