Is there an ethically acceptable reason to study and use the various attack methods described in this chapter? Can you think of any examples where ethical hacking occurs? What is your opinion of ethical hacking and can it be beneficial?