ESXi-Based Security Monitoring & Intrusion Detection

16.06.2025 ~ 23.06.2025

Overview

This project established a Kali Linux environment and executed realistic attack scenarios against a deliberately vulnerable Metasploitable server in order to perform system penetration testing. By analysing the attack processes and collecting the generated logs, we identified potential security weaknesses and gathered practical data necessary for developing effective defence strategies.

My Role

I led the execution of attack scenarios using Kali and conducted penetration tests designed to elicit relevant logs, driving the core security assessment process.

  • Kali Linux setup and attack execution
  • Installed and configured the Kali Linux distribution and prepared the environment to utilise various penetration-testing tools. I targeted the Metasploitable server to perform realistic access and intrusion scenarios.

  • Vulnerability analysis and log elicitation
  • Through active exploitation attempts, I identified vulnerabilities in the Metasploitable server and intentionally generated and captured system logs at each attack phase to simulate traces left by real incidents.

  • Review and analysis of attack logs
  • After the penetration tests, I thoroughly reviewed the system and network logs produced by the attacks to assess the impact and to pinpoint weaknesses in the defence mechanisms.

Result

The simulated penetration tests using Kali Linux successfully exposed multiple vulnerabilities within the Metasploitable server and demonstrated feasible attack vectors. Detailed logs were collected and analysed for each attack stage, enabling a clear understanding of potential attack paths and forensic artefacts, and providing actionable insights to strengthen defences.

Tech Stack

Kali Linux, Metasploit, Metasploitable, web scanning tools, password-cracking tools
Penetration testing, vulnerability analysis and exploitation, log analysis and security auditing, security infrastructure deployment and operation

Presentation (PDF)

You can check the project presentation here — Korean PDF available below.

Download

Back to Projects