This repository contains walkthroughs, notes, and exploitation reports from the Network Security learning path.
The focus is on network reconnaissance, Nmap scanning, and protocol analysis, with hands-on examples and screenshots.
-
Passive Reconnaissance
Using tools likewhois,nslookup,dig, and search engines to gather intelligence without touching the target. -
Active Reconnaissance
Leveraging tools liketraceroute,ping,telnet, and web browsers to actively interact with targets. -
Nmap Basic Port Scans
Performing TCP Connect, SYN, and UDP scans to identify open ports and services. -
Nmap Advanced Port Scans
Using stealth techniques (FIN, XMAS, NULL, Idle scans) to bypass firewalls and intrusion detection systems. -
Net Sec Challenge
Applying reconnaissance and scanning techniques in a real-world style lab challenge.
Each lab write-up includes:
- Summary of the Target – Short description of the lab and objectives.
- Exploitation Steps – Walkthrough of tools, commands, and techniques used.
- Findings with Screenshots – Proof of reconnaissance results or vulnerabilities.
- Remediation Advice – Guidance to secure and mitigate issues.
This repo is designed to showcase penetration testing fundamentals in networking, including:
- Passive & Active Reconnaissance
- Service and Port Scanning with Nmap
- Firewall and IDS Evasion Techniques
- Protocol Analysis and Common Misconfigurations
Clone the repository and explore the reports:
git clone https://github.com/<your-username>/Network-Security-Labs.git
cd Network-Security-Labs