The Basics Of Ethical Hacking and Penetration Testing