This project was completed as part of the Information Systems Security course
at the International Hellenic University (Department of Information and Electronic Engineering).
It represents an educational penetration testing exercise using the Jangow 01 virtual machine from VulnHub.
The goal was to practice penetration testing methodologies in a safe, controlled environment.
- Practice penetration testing in a virtual lab environment (VulnHub).
- Apply methodologies: reconnaissance, exploitation, privilege escalation.
- Document the process in a penetration test style report.
- Kali Linux
- netdiscover, nmap
- Local File Inclusion (LFI) exploitation
- netcat
- LinPEAS
- exploit-db
- gcc
- Full Report (PDF) โ detailed write-up (in Greek).
- Presentation (PDF) - slides summarizing the project (in Greek).
- Screenshots and notes of the exploitation process.
- This project was completed collaboratively with a fellow student.
- Some steps were inspired by publicly available tutorials and write-ups, for educational purposes only.
- The goal was to understand and practice penetration testing methodology, not to produce original exploits.
This project was conducted on the VulnHub Jangow 01 VM strictly for educational purposes,
as part of the Information Systems Security course at the International Hellenic University.
All work was performed in a safe virtual environment on personal computers.
โก๏ธ Please note: Similar activities must only be carried out in authorized lab environments.