How to use AI and Automation for Ethical Hacking and Vulnerability Assessment