This report details a penetration test conducted using Kali Linux, covering reconnaissance, scanning, exploitation, and post-exploitation phases. The scope includes analyzing a net server for vulnerabilities, with target ranges specified. The report outlines testing methodologies, including active and passive reconnaissance, various scanning techniques, and exploitation methods. Findings include a summary of risks, risk assessment criteria, and detailed penetration test results using tools like ZapProxy, Sqlmap, Sqlninja, and Joomscan. High-risk findings, such as weak passwords and vulnerable ports, are identified, along with proposed solutions. The report also covers a Boot2Root challenge, demonstrating exploitation using Metasploit, including database creation and auxiliary attacks. The analysis provides a comprehensive overview of network security, vulnerability assessment, and exploitation techniques, offering valuable insights into securing systems against potential threats.