preloader

What are the different techniques used in ethical hacking ?