README.md VMware_Lab_Report.pdf Pivoting.pdf Penetration_Test_Report.pdf METASPLOITABLE 2 VULNERABILITY ASSESSMENT REPORT.pdf
Author: Mahi Ahmed Apon Cybersecurity Enthusiast | Penetration Testing | Red Teaming | Network Security
---
This project documents the design and execution of a professional cybersecurity home lab built using VMware Workstation. The environment simulates a realistic, segmented enterprise network, specifically designed to practice the transition from initial access to internal network compromise.
Core Focus Areas:
- Vulnerability Assessment & Exploitation
- Privilege Escalation (Linux/Windows)
- Internal Network Enumeration & Pivoting
- Lateral Movement & Post-Exploitation
---
The environment is logically segmented into two distinct zones to simulate a perimeter-based defense.
-
Kali Linux: Primary Offensive Platform.
-
Metasploitable 2 (The Pivot): A dual-homed vulnerable web server acting as the bridge.
eth0: Connected to External Network.eth1: Connected to Internal Network.
- Domain Controller: Windows Active Directory Services.
- App Server: Internal Corporate Application Host.
- Employee Workstation: Windows 10 Client System.
---
- Host Discovery:
netdiscover,ARP scanning. - Service Mapping: Full
NmapTCP/UDP port scans and banner grabbing. - Vulnerability Research: Mapping services to known CVEs using
Searchsploit.
Successfully gained initial access through multiple vectors:
- vsftpd 2.3.4 Backdoor (CVE-2011-2523)
- Samba usermap_script (CVE-2007-2447)
- PHP CGI Argument Injection (CVE-2012-1823)
- Credential Attacks: SSH/Telnet brute-forcing and MySQL default credential exploitation.
- Local Escalation: Exploiting misconfigurations to gain
ROOTandSYSTEMprivileges. - Credential Harvesting: LSASS memory dumping, NTLM hash extraction, and Token Impersonation.
---
- Hypervisor: VMware Workstation Pro
- OS: Kali Linux, Metasploitable 2, Windows Server, Windows 10
- Frameworks: Metasploit, Proxychains
- Scanning: Nmap, Netdiscover
- Cracking: Hashcat, John the Ripper
---
This repository includes detailed documentation of the lab's lifecycle:
- [Isolated VMware Lab Setup]
- [Vulnerability Assessment Metasploitable 2]
- [Full Penetration Testing Execution Report]
---
This project was conducted in a fully isolated and authorized lab environment for educational purposes only. Unauthorized access to computer systems is illegal. Always follow ethical guidelines and the rules of engagement.