II: Modifying and Hacking Security ToolsChapter 7: Fun with Linux Kernel ModulesChapter 8: Developing Web Assessment Tools and ScriptsChapter 9: Automated Exploit ToolsChapter 10: Writing Network SniffersChapter 11: Writing Packet-Injection Tools