ETHICAL HACKING: UNVEILING VULNERABILITIES USING PENETRATION TESTING