5 Common Traits of Ethical Hackers