serve as running examples throughout the entire book. You'll conduct reconnaissance on MedSecure in Part 2, exploit ShopStack's web application in Part 4, and deliver complete engagement reports in Part 8. By the end, you'll have followed the full lifecycle of realistic penetration tests.