Ethical Hacking Techniques Explored