image.png

Overview

In this engagement, we were commissioned by Inlanefreight Ltd to perform a footprinting and enumeration assessment against systems within their internal network. The objective of this assessment was to evaluate how much sensitive information could be obtained through non-intrusive reconnaissance techniques, without exploiting or disrupting production services.

This lab emphasizes methodical internal reconnaissance, service discovery, and attack surface identification, mirroring the early stages of a real-world penetration test.


Scope and Objectives

The scope of this lab focused on the first internal server, which functions as a DNS server. The client specifically requested an assessment of what information could be extracted from this service and how such information could potentially be leveraged by an attacker to map or weaken their infrastructure.

All testing was conducted under strict constraints:


Tools Used


Nmap Scanning

I began by running an Nmap scan to identify any open ports and running services on the target server.