This project details a penetration test performed using a Linux-based system, focusing on information gathering, vulnerability detection, and exploitation. The project utilizes Kali Linux and Metasploit for practical application, including setting up network configurations and IP addresses. It employs Nmap for port scanning and vulnerability identification, along with techniques like Airbase-ng, Hirte Attack, Caffe Spasm, and Hydra for penetration and password retrieval. The Nessus vulnerability scanner is used to identify and analyze vulnerabilities, such as command injection and outdated applications, and the project explores mitigation strategies, including application firewalls and system hardening. The project concludes with a reflection on the penetration testing process and its importance in cybersecurity.