Run full-scope practice engagements before moving to reading resources.
Applied Cryptography
Track your progress through this week's content
Opening Framing: The Complete Engagement
Over the past eleven weeks, you've built a comprehensive
penetration testing toolkit. You've learned reconnaissance,
scanning, exploitation, post-exploitation, privilege escalation,
Active Directory attacks, and network attacks.
Now it's time to bring everything together. This capstone
simulates a real penetration testing engagement—from receiving
the scope to delivering the final report. You'll demonstrate
not just technical skills, but professional methodology.
The scenario challenges you to approach a target environment
systematically, document your work thoroughly, and communicate
findings clearly. This is what professional pentesters do.
Key insight: Technical skills get you access. Professional
methodology and communication deliver value to clients.
Capstone Scenario: MegaCorp Industries
You've been engaged to perform a penetration test for
MegaCorp Industries, a mid-sized manufacturing company.
ENGAGEMENT OVERVIEW
Client: MegaCorp Industries
Industry: Manufacturing
Size: 500 employees, 3 locations
Engagement Type: Internal Network Penetration Test
Duration: 1 week (simulated)
Start Position: Attacker on internal network
SCOPE:
- Network range: 192.168.1.0/24 (lab simulation)
- All systems in range are in scope
- Web applications on discovered hosts
- Active Directory (if present)
OUT OF SCOPE:
- Denial of Service attacks
- Physical security testing
- Social engineering
- Production manufacturing systems (192.168.2.0/24)
OBJECTIVES:
1. Identify and exploit vulnerabilities
2. Demonstrate business impact
3. Attempt to achieve Domain Admin (if AD present)
4. Access sensitive data
5. Document attack paths
6. Provide remediation recommendations
RULES OF ENGAGEMENT:
- Testing hours: Any (lab environment)
- Emergency contact: N/A (lab)
- Data handling: Do not exfiltrate real sensitive data
- Documentation: Full documentation required
Phase 1: Reconnaissance and Scanning
Begin with comprehensive discovery:
Tasks:
Host Discovery: Identify all live hosts in scope
Port Scanning: Full port scan of discovered hosts
Service Enumeration: Identify services and versions
Vulnerability Scanning: Run vulnerability scans
Web Application Discovery: Identify web applications
Deliverables:
□ Network diagram showing discovered hosts
□ Port/service matrix for all hosts
□ Technology inventory
□ Initial vulnerability findings
□ Prioritized target list
Methodology Notes:
# Host discovery
nmap -sn 192.168.1.0/24 -oA discovery
# Full port scan
nmap -p- --min-rate=1000 -oA full_ports [targets]
# Service enumeration
nmap -sV -sC -p [ports] -oA services [targets]
# Vulnerability scan
nmap --script=vuln -oA vuln_scan [targets]
# Document everything as you go!
Phase 2: Vulnerability Analysis
Analyze findings and plan exploitation:
Tasks:
Review Scan Results: Analyze all scan output
Research Vulnerabilities: CVE lookup for identified versions
Manual Verification: Confirm key vulnerabilities
Prioritization: Rank by exploitability and impact
Attack Planning: Create exploitation roadmap
Deliverables:
□ Vulnerability inventory with CVE references
□ Verified vulnerability list
□ Exploitation priority matrix
□ Attack plan document
Analysis Framework:
For each vulnerability:
1. What is it? (CVE, description)
2. Is it exploitable? (PoC available?)
3. What access does it provide?
4. What's the business impact?
5. Priority: Critical/High/Medium/Low
Attack plan structure:
- Primary targets (highest value, easiest exploit)
- Secondary targets (backup options)
- Attack chains (vulnerability A → access → vulnerability B)
Phase 3: Exploitation
Execute your attack plan:
Tasks:
Initial Access: Exploit first vulnerability
Post-Exploitation: Enumerate compromised system
Credential Harvesting: Collect credentials
Privilege Escalation: Escalate to root/SYSTEM
Lateral Movement: Move to additional systems
Deliverables:
□ Documentation of each successful exploit
□ Screenshots proving access
□ Credentials harvested (hashes, not plaintext in report)
□ Privilege escalation evidence
□ Lateral movement path documentation
Documentation Requirements:
For each exploitation:
EXPLOITATION RECORD
===================
Target: [IP/hostname]
Vulnerability: [name/CVE]
Tool Used: [Metasploit/manual/etc.]
Commands:
[exact commands used]
Result:
[access level achieved]
Evidence:
[screenshot reference]
Timestamp: [when]
Option 1: Metasploitable + Additional VMs
- Metasploitable 2 or 3
- Add Windows VM if possible
- Create small network
Option 2: VulnHub Machines
- Download 2-3 VulnHub VMs
- Network them together
- Progressive difficulty
Option 3: HackTheBox/TryHackMe
- Complete a Pro Lab or Learning Path
- Document as if real engagement
- Multiple machines recommended
Option 4: Custom Lab
- Build AD environment
- Add vulnerable services
- Most realistic but most work
Recommended minimum:
- 3+ target systems
- Mix of Linux and Windows
- At least one web application
- Network services to enumerate
Tips for Success
Methodology:
- Follow the phases in order
- Don't skip enumeration
- Document as you go, not after
- Take screenshots constantly
Technical:
- Try multiple exploitation methods
- Don't give up after first failure
- Check for credential reuse
- Look for attack chains
Reporting:
- Write for the audience
- Executive summary is critical
- Evidence must be clear
- Recommendations must be actionable
Common Mistakes:
- Rushing to exploitation
- Poor documentation
- Missing obvious vulnerabilities
- Unclear or incomplete report
- No remediation recommendations
Week 12 Outcome Check
By completing this capstone, you will have demonstrated:
Complete penetration testing methodology
Technical exploitation skills
Professional documentation
Clear communication of findings
Practical remediation recommendations
Self-assessment and continuous learning
Congratulations! Completing this capstone demonstrates the skills
expected of a junior penetration tester.
🛡️ Crypto Capstone Extension: Secure Messaging
In addition to the pentest, design a secure messaging prototype.
This reinforces applied crypto skills in a practical build.
End-to-end encryption (use a modern library)
Forward secrecy or per-session keys
Key exchange and storage plan
Threat model for misuse and key exposure
Deliverable: Design notes + minimal prototype or pseudocode.
🎯 Hands-On Labs (Free & Essential)
Run full-scope practice engagements before moving to reading resources.
🎮 TryHackMe: Blue (Windows Pentest)
What you'll do: Execute a full attack chain against a Windows target.
Why it matters: Applies reconnaissance, exploitation, and reporting in one flow.
Time estimate: 2-3 hours
What you'll do: Perform recon, exploit weaknesses, and escalate privileges.
Why it matters: Mimics a full Linux pentest workflow.
Time estimate: 2-3 hours
Task: Write a complete report from scope to remediation.
Deliverable: Executive summary, findings table, evidence, and remediation steps.
Why it matters: The report is the main value clients receive.
Time estimate: 2-3 hours
🛡️ Lab: Secure Messaging Prototype
What you'll do: Build or outline a secure messaging flow with proper key handling.
Deliverable: Prototype, pseudocode, or architecture diagram.
Why it matters: Applied crypto makes you a more credible tester.
Time estimate: 2-3 hours
💡 Lab Tip: Your report should map each finding to evidence, impact, and fix.
Resources
Reference these resources as you complete your capstone.
This capstone represents the culmination of your ethical hacking
journey in CSY202. You've progressed from understanding concepts
to executing a complete penetration test.
Reflect on these questions:
Compare your skills and confidence now versus Week 1.
What specific techniques do you feel competent in?
What areas need more practice?
What was the most challenging part of this capstone?
How did you overcome it?
How did the experience of writing a professional report
change your perspective on documentation?
What ethical considerations came up during your testing?
How did you handle them?
Where do you want to go from here? Certifications?
Specializations? Bug bounty? Red team?
A strong final reflection will honestly assess growth, identify
areas for continued learning, and articulate your career direction.
What's Next?
Completing CSY202 opens doors to specialized topics:
CSY203 - Web Application Security:
Deep dive into OWASP Top 10, advanced web attacks
CSY204 - Digital Forensics:
Evidence collection, analysis, and investigation
CSY205 - Cloud Security:
Securing and testing AWS, Azure, and GCP
CSY206 - Red Team Operations:
Advanced adversary simulation
Certifications to Consider:
CompTIA PenTest+ (entry-level pentest)
eJPT (eLearnSecurity Junior Penetration Tester)
OSCP (Offensive Security Certified Professional)
PNPT (Practical Network Penetration Tester)
Practice Platforms:
HackTheBox
TryHackMe
VulnHub
PentesterLab
Bug Bounty Programs
Congratulations on completing CSY202! You now have a solid
foundation in ethical hacking and penetration testing. These
skills are in high demand and open doors to many career paths.
Remember: with great power comes great responsibility. Use your
skills ethically, continue learning, and contribute positively
to the security community. Welcome to the offensive security world!