An Ethical Hackers Guide: Part 5 - Methodology and Tools