Build an isolated penetration testing lab using Oracle VirtualBox to simulate a vulnerable internal network. The objective was to perform structured reconnaissance, host discovery, and service enumeration while documenting findings in a controlled NAT environment.
This project demonstrates practical skills in network analysis, attack surface identification, and security assessment methodology.
- Host System: Windows 11
- Hypervisor: Oracle VirtualBox
- Attacker Machine: Kali Linux
- Target Machine: Metasploitable 2
- Network Configuration: NAT Network (10.0.2.0/24)
- Nmap
- Netcat
- Wireshark
- theHarvester
- WHOIS
- dig
- nslookup
- Shodan
This lab followed a structured two-phase approach:
- Passive reconnaissance using public intelligence sources
- Active enumeration inside an isolated virtual network


- Multiple open TCP ports and services were identified on the target system.
- Service enumeration revealed outdated and potentially vulnerable software versions.
- Enumeration provided enough intelligence to identify high-risk exposure areas without executing exploits.
Open and outdated services increase attack surface exposure. Service version details can enable targeted exploitation. Proper segmentation and service restriction reduce exposure.
- Disable unused services
- Restrict inbound access using firewall rules
- Apply patch management and keep services updated
- Segment networks to limit lateral movement
- Structured methodology improves accuracy and reduces missed findings
- Enumeration provides high-value intelligence
- Documentation quality matters in professional reporting
- Lab isolation is essential when testing vulnerable systems











