Every technique a hacker desires is available on the internet, from network exploration or security auditing, to vulnerability scanners and password crackers. I don’t think you will ever be able to prevent such techniques from being displayed on the internet, but I do feel that this information can be used by network administrators to ensure security measures are up to date.