A Guide to Hands On Network Pentesting