Latest Techniques Used by Ethical Hackers