A controlled four-VM cyber range simulating a small business internal network. Built to demonstrate professional penetration testing methodology — from reconnaissance through to documented risk findings and remediation recommendations.
This lab simulates a Tanasiom Aegis internal security assessment commissioned by a fictional SME client. All testing was conducted exclusively within the virtualised environment — no external systems were targeted at any point.
All virtual machines run on a Windows 11 host inside Oracle VirtualBox. An isolated Host-Only network (192.168.56.0/24) provides internal connectivity without exposing vulnerable systems to the internet.
Network and service enumeration performed from Kali Linux (192.168.56.103). Results below are the actual outputs produced during the lab engagement, presented in structured evidence format.
| IP Address | Status | Identified Host | MAC Vendor |
|---|---|---|---|
| 192.168.56.102 | up | Windows 10 Workstation | Oracle VirtualBox NIC |
| 192.168.56.103 | up | Kali Linux (Attacker) | Oracle VirtualBox NIC |
| 192.168.56.104 | up | Ubuntu Server (Web) | PCS Systemtechnik / Oracle |
| 192.168.56.105 | up | Metasploitable 2 | Oracle VirtualBox NIC |
| Port | State | Service | Version | Risk |
|---|---|---|---|---|
| 22/tcp | open | SSH | OpenSSH 9.6p1 Ubuntu 3ubuntu13.14 | Medium |
| 80/tcp | open | HTTP | Apache httpd 2.4.58 (Ubuntu) | High |
| Port | State | Service | Version | Risk |
|---|---|---|---|---|
| 21/tcp | open | FTP | vsftpd 2.3.4 | Critical |
| 22/tcp | open | SSH | OpenSSH 4.7p1 Debian 8ubuntu1 | High |
| 23/tcp | open | Telnet | Linux telnetd | Critical |
| 25/tcp | open | SMTP | Postfix smtpd | Medium |
| 53/tcp | open | DNS | ISC BIND 9.4.2 | High |
| 80/tcp | open | HTTP | Apache httpd 2.2.8 | High |
| 139/tcp | open | SMB | Samba smbd 3.X | High |
| 445/tcp | open | SMB | Samba smbd 3.0.20 | High |
| 512/tcp | open | rexec | netkit-rsh rexecd | Critical |
| 1099/tcp | open | Java RMI | Java RMI Registry | High |
| 1524/tcp | open | Bindshell | Metasploitable root shell | Critical |
| 3306/tcp | open | MySQL | MySQL 5.0.51a-3ubuntu5 | High |
| 5432/tcp | open | PostgreSQL | PostgreSQL DB 8.3.0 | High |
| 8180/tcp | open | HTTP (Tomcat) | Apache Tomcat/Coyote | High |
| Path / Location | Finding | Severity |
|---|---|---|
| /DVWA/.git/config | Git config file exposed — repository details accessible remotely | Critical |
| /DVWA/.git/index | Git Index file found — may leak full directory listing | Critical |
| /DVWA/.git/HEAD | Git HEAD file found — full repository details may be accessible | High |
| /DVWA/config/ | Directory indexing enabled — configuration files browseable | High |
| /DVWA/database/ | Directory indexing enabled — database directory accessible | High |
| /DVWA/tests/ | Directory indexing enabled — test files browseable | Medium |
| /DVWA/ | X-Frame-Options header not present — clickjacking risk | Medium |
| /DVWA/ | X-Content-Type-Options header not set — MIME sniffing risk | Medium |
| /DVWA/login.php | Admin login page identified | Info |
| /DVWA/.gitignore | .gitignore found — internal directory structure visible | Info |
Seven findings identified across the simulated Acorn Financial Services internal network. Rated by severity and mapped to NCSC Cyber Essentials control areas. All three Critical findings represent conditions that would cause automatic failure of CE assessment.
Damn Vulnerable Web Application installed on Ubuntu Server (192.168.56.104) to simulate a company internal web portal with documented vulnerabilities. Full manual deployment including Apache, PHP, MySQL, and database configuration.
The Tanasiom Aegis engagement follows a structured six-phase approach producing documented evidence at each stage. The methodology aligns with industry standards including PTES and OSSTMM, and maps all findings to NCSC Cyber Essentials control areas.