This report details the process of ethical hacking and system infiltration, focusing on locating five specific flags within a provided system. It outlines the methodology used, including the installation of a virtual machine and the execution of various tests and attacks. Techniques such as examining web server content, utilizing web shells, cracking passwords with tools like Hashcat, and employing Nmap for network exploration are described. The report highlights the importance of each flag, representing different aspects of system compromise, such as recognizing administrator credentials, understanding web shells, cracking passwords, identifying incorrectly entered passwords, and gaining knowledge of Linux privilege escalation. The report concludes with recommendations for future improvements, such as using the ncrack tool for more effective password cracking.