Ethical Hacking And Penetration Testing Guidelines