Which of the following is used to purposely attack a system to exploit vulnerabilities?