Ethical Hacking Deep Dive: Metasploit, Nmap, and Advanced Techniques