This repository contains four projects focused on ethical hacking and cybersecurity. Each project provides hands-on experience with essential techniques for network scanning, password cracking, and honeypot deployment.
Learn how to use Nmap to discover devices and services running on a local network. This project covers basic network scans, identifying open ports, and gathering information about network devices.
- Key Topics: Network Scanning, Enumeration, Nmap
- Tools: Kali Linux, Nmap
Use various tools to perform penetration testing on OWASP Juice Shop, a deliberately insecure web application. This project covers identifying and exploiting web vulnerabilities.
- Key Topics: Web Application Testing, OWASP Juice Shop, Vulnerability Exploitation
- Tools: Kali Linux, OWASP Juice Shop, Burp Suite
Learn how to use John the Ripper to crack password hashes. This project covers basic password cracking, using custom wordlists, and cracking shadow file hashes.
- Key Topics: Password Cracking, John the Ripper, Hash Analysis
- Tools: Kali Linux, John the Ripper
Deploy and monitor a honeypot using Cowrie. This project covers setting up Cowrie, simulating attacks, monitoring logs, and analyzing captured data.
- Key Topics: Honeypot Deployment, Intrusion Monitoring, Cowrie
- Tools: Kali Linux, Cowrie, Docker, Splunk
-
Clone the Repository:
git clone https://github.com/PulkitGahlot/Ethical-Hacking-Projects.git cd Ethical-Hacking-Projects -
Navigate to Each Project Directory: Each project has its own markdown file with detailed instructions. For example:
cd project-1-scanning-and-enumerating-a-local-network-with-nmap -
Follow the Instructions: Open the corresponding markdown file and follow the step-by-step instructions to complete the exercises.
Hi, I'm Pulkit Gahlot, a cyber security enthusiast and passionate to be an ethical hacker. I have completed these projects in my learning journey.
- LinkedIn: Pulkit Gahlot
- X: Pulkit Gahlot
Feel free to connect with me on any of these platforms!
I am open to work in the field of cyber security, red teaming and ethical hacking profiles. Also I am available to work in Computer Networking Profiles, AI and ML Profiles too.
Thank you for visiting my GitHub page!