Reference no: EM133999885
Tutorial 1 - Reconnaissance
Penetration Testing & Countermeasures
Choose a Target
Option A - Juice Shop (Docker):
1. Install Docker.
2. Run: docker run -d --name juice -p 3000:3000 bkimminich/juice-shop
Target = localhost:3000
Stop/cleanup: docker stop juice && docker rm juice
Option B - Metasploitable2 (VirtualBox host-only):
1. Import the Metasploitable2 OVA into VirtualBox.
2. Attach Host-Only Adapter, start VM and note its IP (e.g., 192.168.56.101).
Target = VM IP.
Note: You may use Kali, BackBox, or Parrot as your attacking VM. If Docker/VM targets are not possible, consult your tutor for alternatives.
Workspace & Start Log
Open a terminal in your attacker VM and run:
mkdir -p ~/lab_recon/week1 && cd ~/lab_recon/week1
echo "$(date) | START Recon | operator: <YourName> | ID: <YourID>" >> commands-log.txt
Commands to Run (Kali/BackBox/Parrot)
Passive Recon (10-15 min):
# WHOIS (if you have a real domain)
whois lab.example.local > whois-lab.txt
# DNS queries
dig lab.example.local ANY +noall +answer > dig-any.txt
dig lab.example.local A +short > dig-A.txt
dig lab.example.local MX +short > dig-MX.txt
dig _dmarc.lab.example.local TXT +short > dig-dmarc.txt
Active Recon (20-25 min):
# Host discovery
nmap -sn 192.168.56.0/24 -oN nmap-discovery.txt
# OR for Juice Shop
nmap -p 3000 localhost -oN nmap-discovery.txt
# Service/version scan
nmap -sV -p 22,80,443 <targetIP> -oN nmap-sv-<targetIP>.txt
nmap -sV -p 3000 localhost -oN nmap-sv-juice.txt
# Banner grabs
echo -e "HEAD / HTTP/1.0\r\n\r\n" | nc <targetIP> 80 > banner-<targetIP>-80.txt
echo -e "HEAD / HTTP/1.0\r\n\r\n" | nc localhost 3000 > banner-juice-3000.txt
nc <targetIP> 25 > banner-<targetIP>-25.txt < /dev/null
Wireshark / Packet Capture (Optional)
If Wireshark is installed, start a capture while scanning and save as scan_capture.pcap.
Take a screenshot of filtered traffic (e.g., DNS queries or HTTP requests).
If Wireshark is not available, this step may be skipped.
Report (One Page)
1. Header: name, student ID, date/time, target type (Docker/VM)
2. Targets tested (domain/IPs - lab only)
3. Exact commands run (3-8 lines)
4. Top 3 findings table (ID | Target | Evidence filename | Short description | Risk | Recommendation)
5. Declaration: 'I confirm I ran tests only on lab targets and saved evidence.' No AI shortcuts — Get genuine assignment help from experienced, real tutors.
6. Answers to Q1-Q12 (concise, numbered)
Q1-Q12 (Answer in your Report)
Q1: Domain(s) queried & filenames for WHOIS/DNS outputs
Q2: WHOIS field(s) for registrar & name servers
Q3: DNS record types queried & which file shows mail server config
Q4: One follow-up active recon action you would plan
Q5: One Google dork (text) and why it might reveal sensitive data
Q6: Filename of Nmap discovery file & IP you selected
Q7: Filename of Nmap service/version output file
Q8: Filenames of banner outputs
Q9: Port numbers open on the chosen host
Q10: One-line mitigation for the highest-risk port
Q11: Exact ZIP filename you will upload
Q12: Confirm (Y/N) that evidence-sha256.txt includes all hashes