In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to break into you...