The report involved conducting information gathering and system identification on a designated URL assigned by the instructor. My group and I utilized multiple tools to ensure consistency and accuracy of the results. The scope of the assignment included active and passive reconnaissance, port scanning, vulnerability scanning, fingerprinting and enumeration. The report also included a presentation of identified vulnerabilities and recommended measures for mitigation.