Ethical Hacking Deep Dive: Metasploit, Nmap, And Advanced Techniques