Made byBobr AI

Fundamentals of Penetration Testing Methodology Guide

Learn penetration testing basics: footprinting, reconnaissance, and vulnerability scanning using Kali Linux and Metasploitable 2 in a lab environment.

#penetration-testing#cybersecurity#information-security#kali-linux#vulnerability-scanning#network-security#educational
Watch
Pitch

Penetration Testing Methodology

DIY Project – Part 1 Using Metasploitable 2

👤 Student Details

Name: Aryan Kumar Singh College: Amity University Online Semester: 4 Email: aryansingh2887@gmail.com

📄 Project Details

Course: Information Security Project: TCS iON Career Edge
Made byBobr AI

Introduction

Penetration testing is the process of identifying security weaknesses in systems and networks by simulating real-world attack scenarios.

This project focuses on reconnaissance, information gathering, and vulnerability scanning performed in a controlled virtual lab environment.
Made byBobr AI

Objectives

  • To understand standard penetration testing methodology.
  • To perform comprehensive footprinting on a target system.
  • To identify open ports and running services.
  • To detect potential vulnerabilities using scanning tools.
Made byBobr AI

Virtual Lab Setup

The simulation was conducted in a safe, isolated network.

Host OS: Windows
Attacker Machine: Kali Linux
Target Machine: Metasploitable 2
Network Type: Host-Only Network (Isolated)
Made byBobr AI

Footprinting: Whois Lookup

$ whois target-domain
Details Gathered:
• Domain registration details
• Registrar information
• Creation and expiry dates
• Administrative contact details
Made byBobr AI

DNS Footprinting

Tools: nslookup, dig

Output Observed:
• Name server records
• Mail exchange (MX) records
• IP address resolution
Made byBobr AI

Network Footprinting & Enumeration

Tool: Nmap
Command: nmap target-ip

Findings:
• Live host detected
• Open ports identified
• Service names and versions displayed
Made byBobr AI

Social Engineering Footprinting

  • Method: Passive Information Gathering (OSINT)
  • Sources: Public websites, Social media (LinkedIn), Job postings
  • Identified Data: Technologies in use, key employee roles, OS versions, running software.
Made byBobr AI

Port Scanning Results

TCP 21: FTP
TCP 22: SSH
TCP 23: Telnet
TCP 80: HTTP
TCP 139: NetBIOS
TCP 445: SMB
TCP 3306: MySQL
TCP 5900: VNC
Made byBobr AI

Service Identification

  • FTP (21): File Transfer Protocol service running, potentially unencrypted.
  • SSH (22): Remote secure shell enabled.
  • Telnet (23): Insecure remote administration protocol detected.
  • MySQL (3306): Database service active and listening.
Made byBobr AI

Database Enumeration

Specific scans were targeted at database services.

Findings:
• MySQL service detected on default port 3306.
• Database is accessible from the network, increasing the risk of unauthorized data access or SQL injection attacks.
Made byBobr AI

SNMP & Patch Enumeration

  • SNMP (Simple Network Management Protocol) service was detected.
  • System information, including OS details and process lists, was accessible without strong authentication.
  • Enumeration revealed multiple missing security patches, indicating an outdated operating environment.
Made byBobr AI

Vulnerability Scanning Tools

Multiple tools were deployed to cross-verify security gaps:

1. SMB Login Check: Testing for weak file sharing credentials.
2. VNC Authentication: Checking remote desktop security.
3. WMAP: Web application vulnerability scanning.
4. Nessus: Comprehensive automated system audit.
Made byBobr AI

Nessus Scan Results

The automated scan highlighted significant risks:

Key Issues: default configurations, outdated services, and weak authentication.

• Critical: 2
• High: 5
• Medium: 7
Chart
Made byBobr AI

Conclusion

Phase 1 of the testing methodology is complete.

• Multiple services were found exposed on the target.
• Open ports significantly increased the attack surface.
• Vulnerability scanning confirmed critical security weaknesses.

Next Steps: Exploitation and remediation planning.
Made byBobr AI
Bobr AI

DESIGNER-MADE
PRESENTATION,
GENERATED FROM
YOUR PROMPT

Create your own professional slide deck with real images, data charts, and unique design in under a minute.

Generate For Free

Fundamentals of Penetration Testing Methodology Guide

Learn penetration testing basics: footprinting, reconnaissance, and vulnerability scanning using Kali Linux and Metasploitable 2 in a lab environment.

Penetration Testing Methodology

DIY Project – Part 1 Using Metasploitable 2

Course: Information Security | Amity University Online

Aryansingh2887@gmail.com

Student Details

Name: Aryan Kumar Singh College: Amity University Online Semester: 4 Email: aryansingh2887@gmail.com

Project Details

Course: Information Security Project: TCS iON Career Edge

Introduction

Penetration testing is the process of identifying security weaknesses in systems and networks by simulating real-world attack scenarios.<br><br>This project focuses on reconnaissance, information gathering, and vulnerability scanning performed in a controlled virtual lab environment.

Objectives

To understand standard penetration testing methodology.

To perform comprehensive footprinting on a target system.

To identify open ports and running services.

To detect potential vulnerabilities using scanning tools.

Virtual Lab Setup

The simulation was conducted in a safe, isolated network.<br><br><b>Host OS:</b> Windows<br><b>Attacker Machine:</b> Kali Linux<br><b>Target Machine:</b> Metasploitable 2<br><b>Network Type:</b> Host-Only Network (Isolated)

Footprinting: Whois Lookup

$ whois target-domain

<b>Details Gathered:</b><br>&bull; Domain registration details<br>&bull; Registrar information<br>&bull; Creation and expiry dates<br>&bull; Administrative contact details

DNS Footprinting

Tools: <code>nslookup</code>, <code>dig</code><br><br><b>Output Observed:</b><br>&bull; Name server records<br>&bull; Mail exchange (MX) records<br>&bull; IP address resolution

Network Footprinting & Enumeration

<b>Tool:</b> Nmap<br><b>Command:</b> <code>nmap target-ip</code><br><br><b>Findings:</b><br>&bull; Live host detected<br>&bull; Open ports identified<br>&bull; Service names and versions displayed

Social Engineering Footprinting

<b>Method:</b> Passive Information Gathering (OSINT)

<b>Sources:</b> Public websites, Social media (LinkedIn), Job postings

<b>Identified Data:</b> Technologies in use, key employee roles, OS versions, running software.

Port Scanning Results

<div style='display:grid; grid-template-columns: 1fr 1fr; gap:20px;'> <div>TCP 21: FTP</div> <div>TCP 22: SSH</div> <div>TCP 23: Telnet</div> <div>TCP 80: HTTP</div> <div>TCP 139: NetBIOS</div> <div>TCP 445: SMB</div> <div>TCP 3306: MySQL</div> <div>TCP 5900: VNC</div> </div>

Service Identification

<b>FTP (21):</b> File Transfer Protocol service running, potentially unencrypted.

<b>SSH (22):</b> Remote secure shell enabled.

<b>Telnet (23):</b> Insecure remote administration protocol detected.

<b>MySQL (3306):</b> Database service active and listening.

Database Enumeration

Specific scans were targeted at database services.<br><br><b>Findings:</b><br>• MySQL service detected on default port 3306.<br>• Database is accessible from the network, increasing the risk of unauthorized data access or SQL injection attacks.

SNMP & Patch Enumeration

SNMP (Simple Network Management Protocol) service was detected.

System information, including OS details and process lists, was accessible without strong authentication.

Enumeration revealed multiple missing security patches, indicating an outdated operating environment.

Vulnerability Scanning Tools

Multiple tools were deployed to cross-verify security gaps:<br><br><b>1. SMB Login Check:</b> Testing for weak file sharing credentials.<br><b>2. VNC Authentication:</b> Checking remote desktop security.<br><b>3. WMAP:</b> Web application vulnerability scanning.<br><b>4. Nessus:</b> Comprehensive automated system audit.

Nessus Scan Results

The automated scan highlighted significant risks:<br><br><b>Key Issues:</b> default configurations, outdated services, and weak authentication.<br><br>• Critical: 2<br>• High: 5<br>• Medium: 7

Conclusion

Phase 1 of the testing methodology is complete.<br><br>• Multiple services were found exposed on the target.<br>• Open ports significantly increased the attack surface.<br>• Vulnerability scanning confirmed critical security weaknesses.<br><br><b>Next Steps:</b> Exploitation and remediation planning.

  • penetration-testing
  • cybersecurity
  • information-security
  • kali-linux
  • vulnerability-scanning
  • network-security
  • educational