THE ROLE OF SOCIAL ENGINEERING IN PENETRATION TESTING: HOW HACKERS EXPLOIT HUMAN WEAKNESSES