This report details an ethical hacking exercise, focusing on penetration testing and vulnerability assessment. The assignment involved infiltrating a virtual machine to gain root-level privileges, using tools like Nmap and Kali Linux. The objective was to locate five strategically placed flags within the system, demonstrating the ability to identify and exploit vulnerabilities. The report outlines the steps taken, including reconnaissance, scanning, exploitation, and maintaining access, along with the tools used and the methodologies applied. The goal of the penetration test was to simulate a real-world attack scenario, allowing for the assessment of system security and the identification of potential weaknesses. The final report includes details of each test run against the system and additional items.