This report explains the vulnerabilities and their exploitation through penetration testing and the boot to root challenge. It covers the testing methodology, reconnaissance, scanning, exploitation, post-exploitation, and reporting. The report also includes a risk assessment criteria and a risk matrix. The Boot 2 Root Challenge section includes six flags that need to be obtained. The report is useful for understanding the vulnerabilities and their impact on the IT organization system.