3. Basics of Ethical hacking