Ethical hacking is a sanctioned endeavor to gain unauthorized access to a computer system, application, or data by employing the techniques and methodologies of hostile attackers. This practice is instrumental in identifying security vulnerabilities, which can subsequently be rectified before a malicious attacker has the chance to exploit them.
It is important to recognize that ethical hacking is a serious endeavor. It necessitates the use of software and other tools specifically designed for ethical hacking in a manner that is both ethical and responsible. It is highly advisable to familiarize oneself with basic or simpler tools prior to progressing to more intricate or advanced tools.
Please be advised: It is highly advised to employ a Virtual Machine. This practice effectively mitigates the risk of any exploitations or vulnerabilities affecting your personal network.
How to Setup A Virtual Machine
There are several options for beginners to deploy their first virtual machine. Here is my previous post on how to set up a virtual machine on your device.

