This document discusses ethical hacking and outlines its various phases. It begins with introductions to types of hackers and hacking phases. The phases of hacking include reconnaissance, scanning systems, gaining access to systems, using compromised systems ("zombie systems"), removing evidence of access, and reporting. The document also notes benefits and limitations of ethical hacking and concludes with a summary and thanks.