Skip to content

ichiragbs/Metasploitable-Lab-Pentesting

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Metasploitable 2 Penetration Testing Lab

πŸ“Œ Overview

This project demonstrates a full penetration testing engagement conducted on a vulnerable virtual machine, within a controlled lab environment.

The objective was to identify security vulnerabilities, exploit them using standard tools, and document the findings in a structured penetration testing report.


🎯 Objectives

  • Perform reconnaissance and identify active hosts
  • Conduct port scanning and service enumeration
  • Analyze vulnerabilities in exposed services
  • Exploit identified vulnerabilities
  • Perform post-exploitation activities
  • Document findings and provide remediation recommendations

πŸ› οΈ Tools Used

  • Nmap – Network scanning and service enumeration
  • Metasploit Framework – Exploitation of known vulnerabilities
  • arp-scan – Local network host discovery

🌐 Lab Environment

  • Target Machine: Metasploitable 2 VM (192.168.0.4)
  • Attacker Machine: Parrot Security Linux VM (192.168.0.6)
  • Network: NAT Network

πŸ” Methodology

The assessment followed a structured approach aligned with industry practices:

  1. Reconnaissance
  2. Scanning & Enumeration
  3. Vulnerability Analysis
  4. Exploitation
  5. Post-Exploitation

🚨 Key Vulnerabilities Identified

CVE ID Vulnerability Impact
CVE-2011-2525 vsftpd Backdoor Full system compromise
CVE-2021-44142 Samba RCE Remote root access
CVE-2012-2925 Weak Web Applications Data theft, SQL Injection
CVE-2011-4862 Telnet Cleartext credentials

πŸ’₯ Exploitation Summary

  • Identified vulnerable services using scanning techniques
  • Exploited Samba vulnerability using Metasploit
  • Successfully gained remote shell access to the target system
  • Verified system-level access through command execution

πŸ” Post-Exploitation

  • Performed basic privilege escalation checks
  • Observed system configuration and environment
  • Evaluated potential persistence mechanisms

πŸ›‘οΈ Recommendations

  • Remove or update outdated services (vsftpd, Samba)
  • Disable anonymous FTP access
  • Replace Telnet with secure alternatives like SSH
  • Implement firewall rules and monitoring solutions
  • Conduct regular vulnerability assessments

πŸ“„ Report

Detailed findings and methodology are documented in the full penetration testing report available in this repository.


⚠️ Disclaimer

This project was conducted in a controlled lab environment for educational purposes only.
No real-world systems were targeted or harmed.


πŸ‘¨β€πŸ’» Author

Chirag B S
Ethical Hacker / Cybersecurity Enthusiast

About

Penetration testing project showcasing vulnerability assessment and exploitation on Metasploitable 2 in a lab environment.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors