This paper discusses ethical hacking, various types of hackers, and methods of hacking attacks, particularly using the Kali Linux operating system. It categorizes hackers into white hat, black hat, and grey hat, detailing their motivations and roles, while also explaining the significance of ethical hackers in enhancing cybersecurity. Additionally, it covers common hacking techniques such as phishing, denial of service (DoS) attacks, and man-in-the-middle (MITM) attacks, alongside their implementation on Kali Linux.