This documentation discusses different phases of systems penetration techniques against Windows and Unix based systems.