This project focuses on identifying security weaknesses in a network by performing vulnerability assessment and penetration testing on a specific IP address. Tools like Nmap, Nessus, Metasploit, and Wireshark were used for scanning, analysis, and exploitation. The goal was to simulate real-world attacks in a safe environment
-
Updated
Apr 16, 2025