🌱 How to start this project?
Do not clone this repository! Just follow the instructions.
This exercise aims to teach students how to perform the reconnaissance phase on a vulnerable website (bWAPP in BeeBox VM).
Requirements
- bWAPP on BeeBox VM (use the one we did in previous projects).
- Kali Linux (attacker machine).
- Ensure you have a network configured in Bridged Networking mode so that BeeBox and your attacker machine can communicate.
- nslookup
- whois
- Sublist3r
- Nikto
- Gobuster
- Dirb
- SecLists repo by Daniel Miessler
📝 Instructions
Step 1: Service Enumeration
Step 2: Domain Information Gathering
Step 3: Vulnerability Scanning
Step 4: Directory and File Brute Forcing
Step 5: Reconnaissance Report
Delivery
Recommendations
-
Document each step and result with screenshots and detailed descriptions.
-
Use a clear and organized structure for the final report.
-
Ensure you have the necessary permissions to perform pentesting in the configured environment.