This document provides a summary of the practical and theoretical knowledge acquired in ethical hacking, specifically in the field of penetration testing and vulnerability assessment. It covers various tasks and activities undertaken during the study, including scanning protocols, identifying vulnerabilities, and exploiting system loopholes. The document emphasizes the importance of ethical hacking in ensuring cybersecurity and preventing attacks on network systems.