Enumeration in Ethical Hacking: Importance & Benefits