This document provides a review of ethical hacking. It discusses that ethical hackers, known as white hat hackers, hack security systems on behalf of their owners with permission to test vulnerabilities. The document outlines the main steps of ethical hacking as reconnaissance, scanning and enumeration, gaining access, maintaining access, and clearing tracks. It also discusses different types of hackers such as white hat, black hat, and grey hat hackers. Finally, it provides examples of common tools used at each step of ethical hacking.