Consequences of Ignoring Ethical Hacking Rules