I am doing a security training for some folks next week and while putting together the presentation I did some 'movies' of different security/'hacker' tools in use:
NMAP Example: (Attacker running NMAP on TOP, Target host with TCPDUMP running on BOTTOM)
Nessus Example: (Attacker running nessus on TOP, Target host with TCPDUMP running on BOTTOM)
Medusa Example: (Running Medusa against a Server running SSH)
Backtrack - Metasploit Example
Security Researcher with about 20 years in the Computer Security Field. Going to talk even if no one is listening..