Ethical Hacking Vulnerability Identification