Ethical hacking lecture 2