Nmap, Burp Suite, Metasploit, and Nessus โ what they do, when to use them, and why analysts need to know them.