0% found this document useful (0 votes)
47 views2 pages

Internship Report

The internship focused on applying cybersecurity knowledge through hands-on tasks such as reconnaissance, traffic analysis, and payload crafting. Interns gained experience with various tools and techniques while overcoming challenges related to password cracking and VM detection. Overall, the experience enhanced confidence and technical skills in ethical hacking and vulnerability analysis.

Uploaded by

hegid91960
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views2 pages

Internship Report

The internship focused on applying cybersecurity knowledge through hands-on tasks such as reconnaissance, traffic analysis, and payload crafting. Interns gained experience with various tools and techniques while overcoming challenges related to password cracking and VM detection. Overall, the experience enhanced confidence and technical skills in ethical hacking and vulnerability analysis.

Uploaded by

hegid91960
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Objectives

The main goals of this internship were to put cybersecurity knowledge into real
use, get better at finding and testing security weaknesses, learn how cyber attacks
are carried out, and understand how red team security teams work. It also helped
interns learn how to use common tools and follow industry methods used in real-
world hacking simulations.

Tasks and Responsibilities

The internship was divided into three progressive levels: Beginner, Intermediate,
and Hard. My task responsibilities included:

 Reconnaissance & Web Scanning


o Conducted open port scanning and service detection using Nmap.
o Brute-forced hidden directories on the target web application using
Gobuster.
 Traffic Analysis & Credential Interception
o Intercepted login POST requests using Wireshark.
o Extracted unencrypted credentials from captured HTTP packets.
 Cryptographic Cracking & Reverse Engineering
o Decrypted a VeraCrypt container using a hash from [Link] and
tools like Hash-Identifier and John.
o Located the entry point of a file using PE Explorer.
 Payload Crafting & Post-Exploitation
o Used a built-in reverse TCP shell using Metasploit, gaining remote
access to a Window’s 10 Pro virtual system.
o Ensured successful connection handling with a built-in handler in
msfconsole.

Learning Outcomes

 Gained comprehensive exposure to cybersecurity tools including Wireshark,


Metasploit, PE Explorer, VeraCrypt and John The Ripper.
 Understood attack techniques such as brute-forcing and privilege escalation.
 Learned structured documentation techniques for creating professional
pentest reports and mitigation plans.
Challenges and Solutions

 Password Cracking with Wrong Assumptions: I initially assumed the


VeraCrypt hash was SHA-512. After reanalyzing with Hash-Identifier, I
discovered it was MD5 and corrected my cracking approach.
 VM Detection Issues: Windows Defender and system protection blocked
payload execution. To resolve this, I disabled Anti-Virus and Windows
Defender temporarily for educational purposes.
 Encountered difficulty with privilege escalation labs. Solved through
research

Conclusion

I have become more confident in applying cyber skills after this [Link]
ShadowFox Cyber Security Internship provided a well-structured environment to
explore ethical hacking and vulnerability analysis. Each task was hands-on and
challenging, pushing my boundaries and strengthening my technical expertise in
offensive security.

Acknowledgments

I sincerely thank my mentor Mr. Surendharan for his valuable insights and
feedback, and the internship coordinator Mr. Aakash for managing the training
process. Special thanks to the ShadowFox team for this enriching opportunity.

You might also like