Penetration Testing and Ethical Hacking

Penetration Testing & Vulnerability Exploitation

2024 – 2025

Project Overview

Conducted network reconnaissance and service enumeration using Nmap in a virtualized lab environment.

Exploited common vulnerabilities like Log4j and EternalBlue using the Metasploit Framework.

Implemented data exfiltration techniques via DNS, ICMP, and HTTP tunneling to bypass network security controls.

Deployed a pfSense firewall and Suricata Intrusion Prevention System (IPS) to contain and detect the simulated attacks.

Technologies & Skills

Metasploit
Nmap
Suricata
pfSense
Penetration Testing
Vulnerability Exploitation
Red Teaming

Project Documentation

TPHE Report I

First evaluation report demonstrating penetration testing methodologies and findings

Download PDF

TPHE Report II

Second evaluation report covering advanced exploitation techniques and security assessments

Download PDF

Project Type

Academic

Explore More Projects