Five hacking tools attackers use to target your data