๐Ÿงช Penetration Testing Capstone

Artemis, Inc. โ€” Security Assessment & Reporting

A structured penetration test capstone covering reconnaissance, target identification, scanning, vulnerability analysis, threat assessment, and professional reporting.

Overview

Objective

Assess security posture and identify vulnerabilities that could enable unauthorized access, privilege escalation, or data compromise โ€” then provide clear remediation steps.

What I Did

  • Reconnaissance (OSINT, domain/email reconnaissance)
  • Target identification + scanning
  • Vulnerability analysis and risk assessment
  • Threat assessment and prioritization
  • Executive summary + technical reporting

Skills Demonstrated

  • Recon & enumeration methodology
  • Vulnerability identification & validation
  • Threat/risk rating and prioritization
  • Security writing (exec + technical audiences)
  • Remediation guidance and hardening mindset

Quick Facts

Engagement Type

Structured walkthrough penetration test (capstone format).

Recon Scanning Vuln Analysis Threat Assessment Reporting

Tools (Examples)

(List only what you actually used.)

  • OSINT tools (Google dorks, ViewDNS, etc.)
  • Network scanning (e.g., Nmap)
  • Vulnerability scanning / validation (lab safe)
  • Documentation + reporting

Deliverables

  • Executive Summary
  • Technical Report
  • Phase documentation (Recon โ†’ Reporting)

Methodology

A phased process designed to mirror real-world assessment workflows and professional reporting.

Phase 1 โ€” Reconnaissance

Collected publicly available information (OSINT) to map potential attack surface.

Phase 2 โ€” Identify Targets & Run Scans

Identified hosts/services and performed scanning/enumeration to discover exposure.

Phase 3 โ€” Identify Vulnerabilities

Mapped weaknesses to risk and impact (misconfigurations, outdated services, app issues).

Phase 4 โ€” Threat Assessment

Prioritized vulnerabilities based on likelihood + impact, and aligned to remediation.

Phase 5 โ€” Reporting

Delivered executive and technical reporting with clear, actionable remediation steps.

Key Findings

Below is a portfolio-safe summary. Detailed steps, evidence, and lab context live inside the deliverables.

Remote Desktop Exposure

HIGH

RDP exposure increases attack surface and can enable brute force or exploitation if patching/auth controls are weak.

  • Recommendation: restrict RDP access (VPN/jump host), enforce MFA, monitor auth events
  • Recommendation: patch and harden remote access settings

Oracle WebLogic Vulnerability

HIGH

Identified a known WebLogic RCE path (example: CVE-2020-14882) that can enable remote compromise if unpatched.

  • Recommendation: apply vendor patch + verify version
  • Recommendation: limit management interfaces / segment network

Broken Access Control

MEDIUM

Access control weaknesses can allow users to access data/actions beyond their permissions.

  • Recommendation: enforce server-side authorization checks
  • Recommendation: implement least privilege + test role boundaries

SQL Injection Risk

HIGH

SQL injection can lead to data exfiltration, authentication bypass, or system compromise.

  • Recommendation: parameterized queries + input validation
  • Recommendation: WAF rules + error handling + logging

Outdated Apache (Privilege Escalation)

MEDIUM

Outdated server components increase risk (example: CVE-2019-0211 on Apache 2.4.25).

  • Recommendation: patch/upgrade to supported version
  • Recommendation: remove unused modules + tighten permissions

General Hardening Gaps

LOW

Configuration improvements reduce blast radius even when vulnerabilities exist.

  • Recommendation: segment networks + limit admin interfaces
  • Recommendation: centralized logging + alerting for auth and privilege changes

Recommended Remediation Priorities

  1. Patch critical services (WebLogic / exposed remote access components).
  2. Reduce exposure (RDP restrictions, segmentation, management interface controls).
  3. Fix application issues (SQLi + access control).
  4. Harden + monitor (logging, least privilege, baselines).

Deliverables

Add the files to a folder like capstone/ inside your website and link them here.

Portfolio Note (Safe Disclosure)

For portfolio safety, keep sensitive data sanitized (real IPs, credentials, exact exploit steps). Show methodology, findings categories, and remediation impact instead.