Hacking Methods, Social Engineering, And Defensive Tools Implementation