CAPSTONE PROJECT
Showcasing cybersecurity and IT skills thought Penetration testing and Wireshark analysis
Task #1001 Penetration, testing And vulnerability Assessment
Reconnaissance & scanning
Phase 1 of this gray-box penetration test focuses on reconnaissance and enumeration using Nmap to uncover open ports, services, OS details, and potential vulnerabilities with limited prior knowledge of the target system.




Exploitation Phase
Using known vulnerabilities to gain unauthorized access and escalating privileges using tools such as Nikto, dirb, and Metasploit.




Mitigation recommendations
Apply principle of least privilege
Patch management
Access Controls Audits
Multi-Factor Authentication
Enable lockout policies
Security Awareness and password hygiene


Wireshark analysis task #1002
Packet Analysis Insight: After capturing over 75,000 packets, Wireshark tools revealed a notable pattern—numerous empty IPv4 packets linked to sequential MAC addresses. This suggests ARP scanning or spoofing-based reconnaissance, likely driven by an automated host discovery method using systematic MAC enumeration via ARP requests.




Mitigation Recommendations
Limit ARP exposure
Harden ICMP Behavior
Update/Disable Legacy Protocols
Implement Network Segmentation & Isolation to prevent lateral movement and escalation of privileges
Wireshark analysis task #1003
SYN Flood Behavior Captured repeated TCP SYN packets to port 80 from spoofed external addresses without corresponding ACKs. Pattern indicates attempted SYN flood DoS, tactic wherein the target is overwhelmed with incomplete connection requests, exhausting system resources and degrading service availability targeting web services on 10.2.2.8.


Mitigation recommendations.
Implement SYN rate-limiting and firewall protections to suppress floods attempts
Enhance internal monitoring for TLS handshake anomalies and ARP surges
Evaluate endpoint exposure via DNS-linked advertisements or third-party redirects
Segment hosts with VLAN and isolate vulnerable devices to reduce the attack surface area.
TASK #1004-Wireshark capture analysis
The activity points to possible network misconfiguration with multiple devices acting as routers, potential spoofing from unexpected MAC addresses, and IPv6 router discovery—likely used to map infrastructure and target services




Mitigations Recommendations
Strengthen endpoint defenses with updated antivirus signatures for trojans and rootkits
Harden the network by disabling ICMPv6 broadcasts and blocking known malicious MAC addresses
Implement monitoring with alerts for spoofing activity and spikes in encrypted traffic.
TASK #1005-Wireshark capture analysis
Wireshark analysis revealed aggressive CDP flood-based reconnaissance, MAC spoofing, and SYN probing activity, indicating targeted efforts to map Cisco device metadata. Thousands of CDP broadcasts were sent to a single host with no replies, suggesting passive fingerprinting. A spoofed MAC initiated rapid three-way handshakes with host 10.2.2.5, alongside bursts of CDP packets and filtered SYN probes, raising concerns about data exfiltration during an active scanning phase.


Mitigation Recommendations
Implement Network Access Controls
Protocol filtering
Implement MAC Spoofing Defense
TCP Scan Mitigation
Segmentation


TASK #1006-Wireshark capture analysis
This Wireshark capture reveals a clear DHCP Starvation attack, where the network was flooded with DHCP DISCOVER packets starting around packet 7 and escalating until capture 204,211. This suggests the attacker used automated MAC spoofing, crafting rapid requests from fake identities to exhaust the DHCP server’s IP pool.


Mitigation Recommendations
Implement Network Defense to detect DHCP Snooping, Port Security, VLAN Segmentation.
Implement Network Traffic control
Integrate IDS/IPS to detect Anomalies in Network Behavior
Conduct periodic testing and validation to ensure controls hold under pressure

