Intermediate Ethical Hacking Techniques