- This repository contains a comprehensive penetration testing report conducted against a Metasploitable 2 virtual machine. The assessment was performed in a controlled lab environment to simulate real-world security testing methodologies for a simulated medical organization, LifeWell Medical Group, an imaginative healthcare corporation used as a test case. The testing identified vulnerabilities across multiple attack vectors relevant to healthcare IT infrastructure.
- The penetration test covered the following areas:
- Network Services (NS) – 17 findings
- Web Applications (WS) – 22 findings
- Privilege Escalation (PES) – 4 findings
- Enumeration (ES) – 3 findings
- Total Findings: 46
- Target System: Metasploitable2 (Linux)
- IP Address: 192.168.85.148
- Testing Period: December 10–19, 2025
- Tools Used: Metasploit, Nmap, Nikto, SQLMap, manual exploitation
- Critical Vulnerabilities: Remote Code Execution (RCE), backdoor services, default credentials
- Common Weaknesses: Missing patches, misconfigured services, weak authentication
- Exploitation Impact: Full system compromise, data leakage, privilege escalation to root
| Severity | Count |
|---|---|
| Critical | 25 |
| High | 12 |
| Medium | 6 |
| Low | 3 |
| Informational | 0 |
- The assessment followed a structured approach:
- Planning & Reconnaissance
- Vulnerability Scanning & Enumeration
- Exploitation & Validation
- Post-Exploitation & Analysis
- Reporting & Remediation Guidance
- Patch management and service hardening
- Strong authentication policies
- Principle of least privilege (PoLP)
- Secure configuration baselines
- Regular security assessments
- This report is intended for educational and authorized security training purposes only. Unauthorized use against systems without explicit permission is illegal and unethical.
- Mohamed Mostafa Sayed Saber Ali (Team Lead)
- Mohamed Hany El Kordy
- Basel Hany Abdallah
- Mohamed Basem El Sayed
- Mohamed Mostafa Abd El Baset
- Youssef Moataz
- For questions regarding this assessment, please reach out to the project maintainers or refer to the contact information within the report.
- This project is part of a security education initiative. All testing was performed in an isolated lab environment.

