EXPLOITING VULNERABILITIES: A PENTESTER'S GUIDE TO ETHICAL HACKING