This document outlines steps to attack a NASA web server and DNS server as part of a penetration test. It begins with reconnaissance of the web server to identify services, OS, and vulnerabilities. SQL injection is used to extract password hashes from the database. Privilege escalation exploits a file inclusion vulnerability to gain root access. Additional access is maintained through backdoors. The second target, a DNS server, is pivoted to after uploading a Metasploit payload to connect back to the attacker's machine. Information gathering and brute force attacks are then performed.