Ethical Hacking: Vulnerable VM Design and Penetration Testing