Common Penetration Testing Techniques Used by Ethical Hackers