Skip to content

wassimsmt/Attack-path-lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🔓 Attack Path Lab – From Reconnaissance to Privilege Escalation

🧭 Lab Architecture

            Controlled Linux Penetration Testing Lab

+---------------------+        Attack Path Flow       +----------------------+
|     Kali Linux      |  -------------------------->  |     Ubuntu Server    |
|      (Attacker)     |                               |       (Target)       |
|                     |                               |                      |
| - Recon (Nmap)      |                               | - SSH Exposure       |
| - Enumeration       |                               | - User Accounts      |
| - Auth Testing      |                               | - Sudo Privileges    |
| - PrivEsc Analysis  |                               | - SUID Binaries      |
+---------------------+                               +----------------------+

Attack Path: Recon → Enumeration → Authentication Testing → Access → Privilege Escalation

📌 Overview

This project simulates a real-world penetration testing scenario in a controlled lab environment. The objective was to identify potential attack paths from initial reconnaissance to privilege escalation on a Linux server.

The lab demonstrates how exposed services, authentication weaknesses, and privilege misconfigurations can lead to full system compromise.

This project highlights both offensive security techniques and defensive awareness.


🎯 Objectives

  • Perform reconnaissance and host discovery
  • Enumerate exposed services
  • Simulate brute-force authentication attempts
  • Analyze system logs for attack traces
  • Identify privilege escalation vectors
  • Document findings in a professional penetration testing report

🧪 Lab Environment

🎯 Target Machine

  • Ubuntu Server
  • OpenSSH service enabled
  • Standard user account with sudo privileges

💻 Attacker Machine

  • Kali Linux
  • Tools used: Nmap, SSH, Linux enumeration commands

🌐 Network

  • Internal virtual LAN environment

🧠 Methodology

The assessment followed a structured penetration testing methodology:

  1. Reconnaissance
  2. Enumeration
  3. Exploitation Simulation
  4. Log Analysis
  5. Privilege Escalation Assessment
  6. Risk Evaluation
  7. Reporting

🔍 Key Findings

  • SSH service exposed to the network
  • Multiple failed authentication attempts observed
  • User account configured with full sudo privileges
  • Presence of SUID binaries that may enable privilege escalation

⚠️ Overall Risk Level: High


🛠 Skills Demonstrated

  • Network reconnaissance
  • Service enumeration
  • Linux system analysis
  • Log analysis
  • Privilege escalation assessment
  • Risk evaluation
  • Technical reporting
  • Documentation and evidence collection

🧰 Tools Used

  • Nmap
  • SSH
  • Linux command-line tools
  • System logs
  • Ubuntu Server
  • Kali Linux

📚 Key Learning Outcomes

This project demonstrates:

  • How attackers identify entry points
  • The importance of monitoring authentication attempts
  • Risks of excessive sudo privileges
  • The role of proper system hardening
  • How to document findings professionally

⚠️ Disclaimer

This project was conducted in a controlled lab environment for educational purposes only. No real systems were targeted.


👤 Author

Wassim Abelghouch
Cybersecurity Student & Aspiring Penetration Tester

About

Internal penetration testing lab simulating a full attack path from reconnaissance to privilege escalation on a Linux server. Demonstrates service enumeration, authentication abuse, log analysis, and root compromise assessment with documented evidence and a professional pentest report.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors