IT Security Ethical Hacking: Common Attacks And Mitigation Techniques