Skip to content

Hands-on security testing labs focused on network discovery, vulnerability tooling, and manual web application testing using Nmap, OpenVAS, and Burp Suite in controlled lab environments

Notifications You must be signed in to change notification settings

ezenielrios/security-testing-labs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

29 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Security Testing Labs

Hands-on security engineering labs focused on network discovery, web application testing, and security tooling analysis using intentionally vulnerable targets in a controlled lab environment.

This repository documents how I test systems, not just the tools I use.


🎯 Purpose

The goal of this repository is to demonstrate practical security engineering skills, including:

  • Identifying exposed services and attack surface
  • Intercepting and analyzing authentication flows
  • Understanding session handling and authorization boundaries
  • Documenting findings clearly and responsibly
  • Recognizing tooling limitations and operational realities

All testing is performed ethically against intentionally vulnerable applications in isolated lab environments.


πŸ§ͺ Lab Environment

  • Attacker: Kali Linux
  • Targets:
    • Metasploitable2
    • OWASP Juice Shop
  • Tools:
    • Nmap
    • Burp Suite Community Edition
    • Docker
  • Network: Isolated host-only / local lab networks

No production, external, or unauthorized systems were tested.


πŸ“‚ Repository Structure

security-testing-labs/ β”œβ”€β”€ methodology/ β”‚ └── testing-approach.md β”‚ β”œβ”€β”€ network-discovery/ β”‚ β”œβ”€β”€ overview.md β”‚ β”œβ”€β”€ nmap-host-discovery.md β”‚ β”œβ”€β”€ nmap-service-enumeration.md β”‚ β”œβ”€β”€ findings-summary.md β”‚ └── sanitized-screenshots/ β”‚ β”œβ”€β”€ web-application-testing/ β”‚ └── authentication/ β”‚ β”œβ”€β”€ testcase-02-authentication-interception.md β”‚ β”œβ”€β”€ testcase-03-session-behavior.md β”‚ └── evidence/ β”‚ β”œβ”€β”€ tooling-limitations/ β”‚ └── openvas-gvmd-limitations.md β”‚ └── README.md

Each section builds on the previous one, moving from surface-level discovery to application-layer security testing.


πŸ” What’s Covered

Network Discovery

  • Host discovery and service enumeration
  • Attack surface identification
  • Risk-based observations and remediation context

Web Application Testing

  • Proxying traffic through Burp Suite
  • Intercepting authentication requests
  • Analyzing unauthorized vs authenticated behavior
  • Observing API responses and session state handling

Tooling & Limitations

  • Practical challenges encountered during setup and use
  • Why tools sometimes fail or behave unexpectedly
  • Lessons learned from troubleshooting real environments

πŸ“Έ Evidence Handling

  • Screenshots are sanitized
  • No credentials, tokens, or personal data are exposed
  • Evidence supports findings without oversharing sensitive details

This mirrors real-world reporting standards.


🧠 Mindset & Approach

This repository emphasizes:

  • Understanding why something behaves a certain way
  • Validating assumptions with evidence
  • Thinking like a defender while testing like an attacker
  • Clear, structured documentation suitable for technical audiences

πŸš€ What’s Next

Planned expansions include:

  • Authorization bypass testing
  • Input validation and injection testing
  • API misuse scenarios
  • Mapping findings to OWASP ASVS and Top 10 controls

βš–οΈ Disclaimer

All activities documented here were conducted in controlled lab environments for educational and professional development purposes only.


If you’re reviewing this repository as part of an interview process, I’m happy to walk through how each test was designed, executed, and interpreted.

About

Hands-on security testing labs focused on network discovery, vulnerability tooling, and manual web application testing using Nmap, OpenVAS, and Burp Suite in controlled lab environments

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published