Ethical Hacking And Countermeasures: An Exploration