Ethical hacking involves 5 steps: 1) information gathering about the target system using techniques like search engines and whois lookups, 2) vulnerability scanning to identify weaknesses, 3) exploitation of vulnerabilities to gain access like through password cracking, 4) maintaining access by installing backdoors or software, and 5) reporting findings to the target so they can remedy issues found.