Pen testing tool or exploit? 6 samples of ways hackers get in

Attackers use the same tools in attacks that pen testers use to test. Six sample vulnerabilities and exploits.