Skip to content

Educational penetration test of the Jangow 01 VM from VulnHub (Information Systems Security course)

Notifications You must be signed in to change notification settings

George17G/vulnhub-jangow01

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

8 Commits
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

VulnHub โ€“ Jangow 01 (Cybersecurity Lab Project)

This project was completed as part of the Information Systems Security course
at the International Hellenic University (Department of Information and Electronic Engineering).

It represents an educational penetration testing exercise using the Jangow 01 virtual machine from VulnHub.
The goal was to practice penetration testing methodologies in a safe, controlled environment.


๐ŸŽฏ Objectives

  • Practice penetration testing in a virtual lab environment (VulnHub).
  • Apply methodologies: reconnaissance, exploitation, privilege escalation.
  • Document the process in a penetration test style report.

๐Ÿ› ๏ธ Tools Used

  • Kali Linux
  • netdiscover, nmap
  • Local File Inclusion (LFI) exploitation
  • netcat
  • LinPEAS
  • exploit-db
  • gcc

๐Ÿ“„ Deliverables


๐Ÿ‘ฅ Notes

  • This project was completed collaboratively with a fellow student.
  • Some steps were inspired by publicly available tutorials and write-ups, for educational purposes only.
  • The goal was to understand and practice penetration testing methodology, not to produce original exploits.

โš ๏ธ Disclaimer

This project was conducted on the VulnHub Jangow 01 VM strictly for educational purposes,
as part of the Information Systems Security course at the International Hellenic University.
All work was performed in a safe virtual environment on personal computers.

โžก๏ธ Please note: Similar activities must only be carried out in authorized lab environments.

About

Educational penetration test of the Jangow 01 VM from VulnHub (Information Systems Security course)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published