Report On Ethical Hacking And Defense Using Case Study