← Return to Main Lab

Security Testing Environment

Network: Isolated VLAN | Role: Security Researcher | Scope: Controlled Lab

01. Core Infrastructure

The Attack Surface

My lab utilizes a Kali Linux instance as the primary attack vector, targeting a variety of intentional "weak" points within a virtualized network.

Nmap Metasploit Burp Suite Wireshark

Lab Statistics

4Active VMs
10.0.xPrivate IP Range
24/7Uptime
L2Isolation

02. Security Methodology

1

Reconnaissance & Enumeration

Scanning network ranges to identify open ports and services using Nmap and directory brute-forcing.

2

Vulnerability Assessment

Comparing service versions against known CVE databases to find potential entry points.

3

Exploitation & Post-Exploitation

Gaining initial access, escalating privileges to Root/Admin, and practicing persistence techniques.

03. Target Systems

Metasploitable 2

A Linux VM specifically configured with dozens of security holes to practice everything from SQL injection to Telnet exploits.

OWASP Juice Shop

A modern web application containing the Top 10 vulnerabilities, used to practice web-based penetration testing.

Active Directory Lab

(In Progress) Building a Windows Domain environment to learn Kerberos attacks and lateral movement.