How do Ethical Hackers Protect Web Applications?