Phases Of Hacking In Ethical Hacking Tools