Application of ethical hacking