Ethical Hacking Case Study: Infiltrating A System And Attaining Root Level Privileges