Using the rules described in class, do a commplete reconnaissance of a specific website or infrastructure. Then use OpenVAS and Builtwith to identify potential vulnerabilities, and come up with an attack plan to do a successful penetration of the site.