A Summary on Ethical Hacking