Objectives
The main goals of this internship were to put cybersecurity knowledge into real
use, get better at finding and testing security weaknesses, learn how cyber attacks
are carried out, and understand how red team security teams work. It also helped
interns learn how to use common tools and follow industry methods used in real-
world hacking simulations.
Tasks and Responsibilities
The internship was divided into three progressive levels: Beginner, Intermediate,
and Hard. My task responsibilities included:
Reconnaissance & Web Scanning
o Conducted open port scanning and service detection using Nmap.
o Brute-forced hidden directories on the target web application using
Gobuster.
Traffic Analysis & Credential Interception
o Intercepted login POST requests using Wireshark.
o Extracted unencrypted credentials from captured HTTP packets.
Cryptographic Cracking & Reverse Engineering
o Decrypted a VeraCrypt container using a hash from [Link] and
tools like Hash-Identifier and John.
o Located the entry point of a file using PE Explorer.
Payload Crafting & Post-Exploitation
o Used a built-in reverse TCP shell using Metasploit, gaining remote
access to a Window’s 10 Pro virtual system.
o Ensured successful connection handling with a built-in handler in
msfconsole.
Learning Outcomes
Gained comprehensive exposure to cybersecurity tools including Wireshark,
Metasploit, PE Explorer, VeraCrypt and John The Ripper.
Understood attack techniques such as brute-forcing and privilege escalation.
Learned structured documentation techniques for creating professional
pentest reports and mitigation plans.
Challenges and Solutions
Password Cracking with Wrong Assumptions: I initially assumed the
VeraCrypt hash was SHA-512. After reanalyzing with Hash-Identifier, I
discovered it was MD5 and corrected my cracking approach.
VM Detection Issues: Windows Defender and system protection blocked
payload execution. To resolve this, I disabled Anti-Virus and Windows
Defender temporarily for educational purposes.
Encountered difficulty with privilege escalation labs. Solved through
research
Conclusion
I have become more confident in applying cyber skills after this [Link]
ShadowFox Cyber Security Internship provided a well-structured environment to
explore ethical hacking and vulnerability analysis. Each task was hands-on and
challenging, pushing my boundaries and strengthening my technical expertise in
offensive security.
Acknowledgments
I sincerely thank my mentor Mr. Surendharan for his valuable insights and
feedback, and the internship coordinator Mr. Aakash for managing the training
process. Special thanks to the ShadowFox team for this enriching opportunity.