Skip to content

Frequently Asked Questions

Answers to the most common questions about the pentesting tools learning lab.

The lab includes 17 open-source tools across two categories:

  • Security tools: nmap, tshark, metasploit, hashcat, john, sqlmap, nikto, hping3, aircrack-ng, skipfish, foremost, ffuf, and gobuster
  • Networking tools: curl, dig, netcat, and traceroute

Each tool has an examples.sh script with 10 annotated commands plus task-focused use-case scripts for common scenarios. Run make check to see which tools are already installed on your system.

These tools are legal to possess and use for authorized testing only. The included Docker lab provides intentionally vulnerable targets (DVWA, Juice Shop, WebGoat, VulnerableApp) for safe, legal practice. Never scan or attack systems without explicit written permission from the owner.

You need a Unix-like system (Linux or macOS), Docker and Docker Compose for the practice lab, and bash. Individual tools can be installed via your system package manager. Run make check to see which of the 17 tools are already available.

Most scripts do not require root. However, some tools need elevated privileges for low-level network access:

  • nmap — SYN scans and OS detection require root
  • tshark — live packet capture requires root or a capture group
  • hping3 — raw packet crafting requires root
  • aircrack-ng — wireless monitor mode requires root

Scripts that need root will tell you when you run them.

Run make lab-up to start all four vulnerable targets:

TargetPortCredentials
DVWA8080admin / password
Juice Shop3000Register a new account
WebGoat8888Register a new account
VulnerableApp8180No auth required

Run make lab-status to check container health and make lab-down to stop everything.

Every script supports a -j flag for structured JSON output. This lets you pipe results into jq or other tools for automation and reporting. Combine -x with -j to capture live command output in JSON format. See the Script Flags & JSON guide for details and examples.

Can I use these tools for CTF competitions?

Section titled “Can I use these tools for CTF competitions?”

Yes. The tools and scripts are commonly used in Capture The Flag challenges. The use-case scripts provide ready-made workflows for reconnaissance, web application testing, password cracking, and network analysis that map directly to typical CTF categories.

  1. Create a directory scripts/<tool-name>/ with an examples.sh file
  2. Follow the existing pattern: source common.sh, call require_cmd, display safety_banner, and list 10 annotated examples
  3. Add the tool to check-tools.sh in the TOOLS array and TOOL_ORDER
  4. Optionally add a Makefile target and a documentation page under site/src/content/docs/tools/

Three curated paths that progress from basics to advanced techniques:

Each path includes hands-on exercises against the Docker lab targets.

Yes. The project includes a Claude Code Skill Pack with 28 slash commands covering all 17 tools, 8 multi-step workflows, and 3 subagent personas. A safety architecture validates all targets against a scope file and logs every tool invocation. See the Claude Code section for setup instructions.

The three diagnostic scripts (DNS, Connectivity, Performance) run automated multi-tool checks and generate structured reports. They combine several tools into a single workflow so you get a comprehensive picture of network issues without running each tool individually. All diagnostics support JSON output with -j.