Penetration Testing and Ethical Hacking
Penetration Testing & Vulnerability Exploitation
2024 – 2025
Project Overview
Conducted network reconnaissance and service enumeration using Nmap in a virtualized lab environment.
Exploited common vulnerabilities like Log4j and EternalBlue using the Metasploit Framework.
Implemented data exfiltration techniques via DNS, ICMP, and HTTP tunneling to bypass network security controls.
Deployed a pfSense firewall and Suricata Intrusion Prevention System (IPS) to contain and detect the simulated attacks.
Technologies & Skills
Metasploit
Nmap
Suricata
pfSense
Penetration Testing
Vulnerability Exploitation
Red Teaming
Project Documentation
TPHE Report I
First evaluation report demonstrating penetration testing methodologies and findings
Download PDFTPHE Report II
Second evaluation report covering advanced exploitation techniques and security assessments
Download PDF