About
This skill provides a comprehensive framework for ethical hacking, guiding users through reconnaissance, scanning, vulnerability analysis, exploitation, and reporting. It includes practical command-line examples for essential security tools like Nmap and Metasploit, helping users identify and remediate weaknesses within authorized environments while strictly adhering to legal compliance and professional standards.