This report provides an introduction to ethical hacking and presents a case study on network security. The report discusses the five flags concept used in the process, including web server, web shells, password cracker, TCP port scanner, and privilege escalation. The report also includes a detailed methodology and testing log, results and recommendations, and source code for tools used. The subject matter covers various aspects of ethical hacking and is relevant for students pursuing courses in cybersecurity, computer science, and related fields.