Enumeration in Ethical Hacking Explained by Senior Field Engineer of Aerospace & Defense Company