Skip to content

Logan722/penetration-testing-labs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

Penetration Testing & Vulnerability Assessment Labs

Penetration Testing Nmap Metasploit Wireshark

Overview

A collection of hands-on penetration testing and vulnerability assessment labs demonstrating practical offensive security skills. These labs cover network enumeration, vulnerability scanning, exploitation techniques, social engineering, and remediation documentation across enterprise environments.

Skills Demonstrated

  • Network Enumeration — Host discovery, port scanning, service identification
  • Vulnerability Scanning — Identifying security weaknesses across multiple platforms
  • Exploitation Techniques — Leveraging vulnerabilities using industry-standard frameworks
  • Reconnaissance & Footprinting — Information gathering and target profiling
  • Social Engineering — Understanding human-based attack vectors
  • Phishing Detection — Identifying and analyzing phishing attempts
  • Remediation Documentation — Mapping findings to actionable security improvements

Tools Used

Tool Purpose
Nmap Network discovery and security auditing
Metasploit Penetration testing framework for exploitation
Wireshark Network protocol analysis and packet capture

Labs Included

1. Reconnaissance and Scanning Lab

  • Performed comprehensive network reconnaissance
  • Conducted port scans to identify open services
  • Detected operating systems and service versions

2. Vulnerability Scanning Labs

Conducted vulnerability assessments across multiple platforms:

  • ✅ Windows Workstations
  • ✅ Linux Servers
  • ✅ Domain Controllers
  • ✅ Wireless Access Points (WAPs)
  • ✅ Security Appliances

3. Footprinting Lab

  • Conducted passive and active reconnaissance
  • Gathered target intelligence for penetration testing engagements
  • Mapped network topology and identified high-value targets

4. Social Engineering Lab

  • Analyzed social engineering attack vectors
  • Understood human vulnerability in security chains
  • Documented defense strategies against social attacks

5. Phishing Detection Lab

  • Analyzed phishing email samples
  • Identified indicators of compromise in suspicious emails
  • Developed detection strategies for email-based threats

6. Wireshark Installation & Network Analysis

  • Installed and configured Wireshark
  • Captured and analyzed network traffic
  • Identified protocols and potential security issues

Repository Structure

penetration-testing-labs/
├── README.md
├── docs/
│   ├── Reconnaissance and Scanning Lab.docx
│   ├── Vulnerabilities Scans Labs.docx
│   ├── Hands_On_Lab_Footprinting_Oni.docx
│   ├── Social Engineering Lab.docx
│   ├── Hands_On_Lab_Ethics_in_IT_and_Detecting_Phishing_E-Mails_Oni.docx
│   └── Installing WireShark.docx
└── screenshots/
    └── [Lab screenshots]

Key Takeaways

  • Understanding of the penetration testing methodology (reconnaissance → scanning → exploitation → reporting)
  • Hands-on experience with industry-standard security tools
  • Ability to identify, document, and recommend fixes for security vulnerabilities
  • Experience scanning enterprise environments with diverse system types

Author

Daniel Oni
M.S. Cybersecurity — Southern Methodist University
LinkedIn | GitHub


This repository documents hands-on security lab work. All testing was performed in controlled, authorized lab environments for educational purposes.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors