A Difficult Grasp In Ethical Hacking