Describe 2 major components of penetration testing. Discuss an ethical hacking tool and how it would be applied within a penetration testing project for an organization.