(1: The tools introduced are all representative tools, but there are many other tools that can carry out effective attacks. 2: The main point is to grasp the brute force attack operating system password, brute force mailbox password and brute force Office document password. 3: Grasp various vulnerability attacks and protection methods, grasp various buffer overflow attacks and protection methods.)