soulane.org

Logo

Pen-Testing Labs

Before conducting any pen-testing exercises, ensure you have proper authorisation and permission to perform such activities on the target network or systems. Additionally, always comply with applicable laws and regulations regarding penetration testing and network security testing.

VoIP Traffic

Capture and analyse Voice over IP (VoIP) traffic to detect potential VoIP-specific attacks or vulnerabilities.

Data Exfiltration

Monitor network traffic for large data transfers, unusual protocols, or unauthorized access patterns indicating potential data exfiltration attempts.

Network Sniffing

Assess the effectiveness of network segmentation, encryption, or intrusion detection/prevention systems against network sniffing attacks.

Malicious File

Capture and analyse traffic associated with file downloads to identify potentially malicious files or payloads.

Password Cracking

Analyse authentication traffic to detect brute force attempts or password cracking activities.

Wireless Security

Analyse authentication traffic to detect brute force attempts or password cracking activities.

Packet Injection

Perform packet injection tests to assess network security controls and analyze how the network handles injected packets.

Port Scanning

Use Wireshark to identify port scanning activities by analysing TCP SYN packets and abnormal connection attempts.

Malware Traffic

Capture and analyse traffic generated by malware-infected hosts to identify communication with command and control servers or data exfiltration attempts.