This report details the identification of network threats using Nmap and Metasploit, focusing on a VNC server penetration test. The introduction highlights the increasing importance of network security due to the proliferation of internet-connected devices and the potential for cyber intrusions. The report explains the functionalities of Nmap for network scanning and Metasploit for exploiting vulnerabilities. A literature review summarizes existing research on vulnerability assessment, penetration testing methodologies, and the use of tools like Nmap and Metasploit. The penetration test involves using Nmap to discover a VNC server running on port 5900 and subsequently employing Metasploit to exploit a weak password. The report then outlines various mitigation techniques to reduce the risk associated with VNC vulnerabilities, such as changing default ports, disabling unused features, using firewalls, and running malware detection software. The conclusion emphasizes the effectiveness of Nmap and Metasploit for vulnerability testing, while also stressing the importance of obtaining proper authorization before conducting such tests.