100% found this document useful (2 votes)
2K views30 pages

Cyber Security Inernship Report

The document is an internship report submitted by Rakesh Kumar to fulfill the requirements for a Bachelor of Technology degree in Computer Science and Engineering. It describes Rakesh Kumar's internship at Prasad and Sons Software Solution Pvt. Ltd. in Gaya, Bihar, India from November 2022 to December 2022 under the supervision of Mr. Vishwajeet Sir. The report includes certificates, acknowledgements, and an index of topics covered during the internship including installation of Linux OS, information gathering, vulnerability analysis, and wireless attacks.

Uploaded by

Atul Kirti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
2K views30 pages

Cyber Security Inernship Report

The document is an internship report submitted by Rakesh Kumar to fulfill the requirements for a Bachelor of Technology degree in Computer Science and Engineering. It describes Rakesh Kumar's internship at Prasad and Sons Software Solution Pvt. Ltd. in Gaya, Bihar, India from November 2022 to December 2022 under the supervision of Mr. Vishwajeet Sir. The report includes certificates, acknowledgements, and an index of topics covered during the internship including installation of Linux OS, information gathering, vulnerability analysis, and wireless attacks.

Uploaded by

Atul Kirti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

INTERNSHIP REPORT

A report submitted in partial fulfillment of the requirements for the Award of Degree of
BACHELOR OF TECHNOLOGY ( B.TECH )
In
COMPUTER SCIENCE AND ENGINEERING
By
RAKESH KUMAR
Registration No. - 20105110908
Roll No. 20/CSE/03/LE

Under Supervision Of
Mr. Vishwajeet Sir (HR)
Prasad and Sons Software Solution Pvt. Ltd.,
GAYA , BIHAR.
( Duration :- November 2022 to December 2022 )

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


GAYA COLLEGE OF ENGINEERING , GAYA
( Approved by AICTE , Permanently affiliated to BEU , Patna )

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


GAYA COLLEGE OF ENGINEERING , GAYA
CERTIFICATE

This is to certif Internship report 7th Semester Student


RAKESH KUMAR (Reg. No. : 20105110908) is work done by his and submitted
during 2022 23 academic year , in partial fulfillment of the requirements for the award
of degree of BACHELOR OF TECHNOOGY (B.TECH) in COMPUTER SCIENCE
AND ENGINEERING at Prasad and Sons Software Solution Pvt. Ltd , Gaya .

Mr. Biplob Goswami Prof. Md. Akanan Aalam


College Internship Coordinator Head of Department of CSE
(A CIN/LLPIN/FCRN : U72300BR2014PTC022634 Certified Company)

CERTIFICATE OF INTERNSHIP
ACKNOWLEDGEMENT

First I would like to thank Mr. Vishwajeet Kumar , HR , Head


of PRASAD AND SONS SOFTWARE SOLUTION PVT. LTD., GAYA , BIHAR
for giving the opportunity to do an internship within the organization.

I also would like all the people that worked along with me PRASAD AND
SONS SOFTWARE SOLUTION PVT. LTD., GAYA , BIHAR with their patience and
openness and they created an enjoyable working environment .

It is indeed with a great sense of pleasure and immense sense of gratitude that I
acknowledge the help of these individuals .

I am highly indebted to Principal Dr. Manoj Kumar for the facilities provided to
accomplish this internship.

I would like to thank my Head of the Department Prof. Md. Akanan Aalam , for
the facilities provided to accomplish this internship .

I would like to thank Mr. Biplob Goswami , college internship coordinator and
Prof. Md. Akanan Aalam internship coordinator Department of CSE for their support
and advices to get and complete internship in above said organization.

I am extremely great full to my department staff members and friends who helped me
in successful completion of this internship.

RAKESH KUMAR
( 20105110908 )
INDEX

S.no CONTENTS

01 Introduction

02 Installation of Linux OS

03 Information gathering

04 Vulnerability Analysis

05 Web Application Analysis

06 Password Attacks

07 Wireless Attacks

08 Reverse Engineering

09 Social Engineering

10 Sniffing & Spooling


01 - Introduction
Cyber Security :-
The technique of protecting internet-connected systems such as computers,
servers, mobile devices, electronic systems, networks, and data from malicious
attacks is known as cybersecurity.
Cyber security is divide into two parts one is cyber, and the other is security.
Cyber refers to the technology that includes systems, networks,
programs, and data.
Security is concerned with the protection of systems, networks,
applications, and information. In some cases, it is also called electronic
information security or information technology security.
Some other definitions of cybersecurity are:

"Cyber Security is the body of technologies, processes, and practices designed to


protect networks, devices, programs, and data from attack, theft, damage, modification
or unauthorized access."

Or

"Cyber Security is the set of principles and practices designed to protect our computing
resources and online information against threats."

Cyber Security Goals


Cyber Security's main objective is to ensure data protection. The security
community provides a triangle of three related principles to protect the data from
cyber-attacks.
Types of Cyber Security
o Network Security: It involves implementing the hardware and software to
secure a computer network from unauthorized access, intruders, attacks,
disruption, and misuse. This security helps an organization to protect its assets
against external and internal threats.
o Application Security: It involves protecting the software and devices from
unwanted threats. This protection can be done by constantly updating the apps
to ensure they are secure from attacks. Successful security begins in the design
stage, writing source code, validation, threat modeling, etc., before a program
or device is deployed.
o Information or Data Security: It involves implementing a strong data storage
mechanism to maintain the integrity and privacy of data, both in storage and in
transit.
o Identity management: It deals with the procedure for determining the level of
access that each individual has within an organization.
o Operational Security: It involves processing and making decisions on
handling and securing data assets.
o Mobile Security: It involves securing the organizational and personal data
stored on mobile devices such as cell phones, computers, tablets, and other
similar devices against various malicious threats. These threats are
unauthorized access, device loss or theft, malware, etc.
o Cloud Security: It involves in protecting the information stored in the digital
environment or cloud architectures for the organization. It uses various cloud
service providers such as AWS, Azure, Google, etc., to ensure security against
multiple threats.

02. Installation of LINUX OS


Installing Kali Linux (single boot) on your computer is an easy process. This guide will
cover the basic install (which can be done on bare metal or guest VM), with the option
of encrypting the partition. At times, you may have sensitive data you would prefer to
encrypt using Full Disk Encryption (FDE). During the setup process you can initiate an
LVM encrypted install on either Hard Disk or USB drives.

(x86_64/64-bit) and i386 (x86/32-bit) platforms. Where possible, we


would recommend using the amd64 images. The hardware requirements are
minimal as listed in the section below, although better hardware will naturally provide
better performance. You should be able to use Kali Linux on newer hardware with
UEFI and older systems with BIOS.
By default use a PAE kernel, so you can run them on systems with over 4 GB of RAM.
We will be installing Kali Linux in a fresh guest VM, without any existing operating
systems pre-installed. We will explain other possible scenarios throughout the guide.
System Requirements

The installation requirements for Kali Linux will vary depending on what you would like
to install and your setup. For system requirements:

On the low end, you can set up Kali Linux as a basic Secure Shell (SSH) server with
no desktop, using as little as 128 MB of RAM (512 MB recommended) and 2 GB of
disk space.
On the higher end, if you opt to install the default Xfce4 desktop and the kali-linux-
default metapackage, you should really aim for at least 2 GB of RAM and 20 GB of
disk space.
o When using resource-intensive applications, such as Burp Suite, they recommend at
least 8 GB of RAM (and even more if it is a large web application!) or using
simultaneous programs at the same time.

Installation Prerequisites

This guide will make also the following assumptions when installing Kali Linux:

Using the amd64 installer image.


CD/DVD drive / USB boot support.
Single disk to install to.
Connected to a network (with DHCP & DNS enabled) which has outbound Internet
access.

Preparing for the Installation

Download Kali Linux (We recommend the image marked Installer).

1. Burn The Kali Linux ISO to DVD or image Kali Linux Live to USB drive. (If you
cannot, check out the Kali Linux Network Install).
2. Backup any important information on the device to an external media.
3. Ensure that your computer is set to boot from CD/DVD/USB in your BIOS/UEFI.
4. In the UEFI settings, ensure that Secure Boot is disabled. The Kali Linux kernel
is not signed and will not be recognized by Secure Boot.

Kali Linux Installation Procedure


Boot

1. To start your installation, boot with your chosen installation medium. You
should be greeted with the Kali Linux Boot screen. Choose either Graphical
install or Install (Text-Mode). In this example, we chose the Graphical install.
live image instead, you will see another mode, Live, which is also
the default boot option.

Language

2. Select your preferred language. This will be used for both the setup process
and once you are using Kali Linux.

3. Specify your geographic location.


4. Select your keyboard layout.

Network
5. The setup will now probe your network interfaces, looks for a DHCP service,
and then prompt you to enter a hostname for your system. In the example
kali as our hostname.

If there is no network access with DHCP service detected, you may need to manually
configure the network information or do not configure the network at this time..

6. You may optionally provide a default domain name for this system to use
(values may be pulled in from DHCP or if there is an existing operating systems
pre-existing).
User Accounts

7. Next, create the user account for the system (Full name, username and a strong
password).
Clock

8. Next, set your time zone.


Disk

9. The installer will now probe your disks and offer you various choices, depending
on the setup.

10. Select the disk to be partitioned.


11. Depending on your needs, you can choose to keep all your files in a single
partition - the default - or to have separate partitions for one or more of the top-
level directories.

All files in one partition

12.
installer makes irreversible changes. After you click Continue, the installer will
Encrypted LVM

If enabled in the previous step, Kali Linux will now start to perform a secure wipe of
the hard disk, before asking you for a LVM password.

Please sure a strong password, else you will have to agree to the warning about a
weak passphrase.

If you wish to risk it, you can skip it.

Proxy Information

13.
enter any appropriate proxy information as needed.
Metapackages

If network access was not setup, you will want to continue with setup when prompt.

If you are using the Live image, you will not have the following stage.

14. Next you can select which metapackages you would like to install. The default
ave to
change anything here.

Please refer to this guide if you prefer to change the default selections.
Boot Information

15. Next confirm to install the GRUB boot loader.


16. Select the hard drive to install the GRUB bootloader in (it does not by default
select any drive).

Reboot

17. Finally, click Continue to reboot into your new Kali Linux installation.
03 Information Gathering
Information Gathering means gathering different kinds of information about
the target. It is basically, the first step or the beginning stage of Ethical
Hacking, where the penetration testers or hackers (both black hat or white hat)
tries to gather all the information about the target, in order to use it for Hacking.

Information gathering is an art that every penetration-tester (pen-tester) and


hacker should master for a better experience in penetration testing.

Information gathering can be classified into the following categories:


Footprinting
Scanning
Enumeration
Reconnaissance

Various tools and techniques are available


1. Spider foot.
2. Google
3. Bing.
4. Shodan
5. Angry IP Scanner
Spiderfoot
This package contains an open source intelligence (OSINT) automation tool. Its goal
is to automate the process of gathering intelligence about a given target, which
may be an IP address, domain name, hostname, network subnet, ASN, e-mail

SpiderFoot can be used offensively, i.e. as part of a black-box penetration test to


gather information about the target, or defensively to identify what information you or
your organisation are freely providing for attackers to use against you.

Installed size: 13.73 MB


How to install: sudo apt install spiderfoot

Google
Google's mission is to organize the world's information and make it universally
accessible and useful. That's why Search makes it easy to discover a broad range
of information from a wide variety of sources.

Google Search is a fully-automated search engine that uses software known as


web crawlers that explore the web regularly to find pages to add to our index.
Shodan

Shodan is a search engine that lets users search for various types of servers
(webcams, routers, servers, etc.) connected to the internet using a variety of filters

Shodan collects data mostly on web servers (HTTP/HTTPS ports 80, 8080, 443,
8443), as well as FTP (port 21), SSH (port 22), Telnet (port 23), SNMP (port
161), IMAP (ports 143, or (encrypted) 993), SMTP (port 25), SIP (port
5060),[2] and Real Time Streaming Protocol (RTSP, port 554).

Angry IP Scanner

Angry IP scanners can scan IP addresses in any range and their ports. It was
designed to be cross-platform and very lightweight.

Angry IP scanner is a freely available IP address and port scanner known for its
ease of use, simplicity, and speed.

Angry IP scanner has additional features to include NetBIOS information (computer


name, workgroup name, and Windows user currently logged in), specified IP
address ranges, web server detection, customizable openers, and more.

Angry IP scanning saves results in many file formats, including CSV, TXT, XML, or
IP-Port list files. Through the extended functionality of available plugins, Angry IP
Scanner can gather a wide variety of information about scanned IP addresses.
Basic Java coding skills are required to write plugins and extend the functionality of
Angry IP Scanner.

04. Vulnerability Analysis

Vulnerability Analysis is one of the most important phases of Hacking. It is done after
Information Gathering and is one of the crucial steps to be done while designing an
application. The cyber-world is filled with a lot of vulnerabilities which are the
loopholes in a program through which hacker executes an attack.
These vulnerabilities act as an injection point or a point that could be used by an
attacker as a launchpad to execute the attack.
Web Application Analysis:

Web Application is a dynamic response web page that helps in a better and
interactive client-server relationship.
Some of the tools are:
1. URL Attack Method
2. SQL Injection
3. Wp Scan
4. Brup Suite

Brup Suite :-
Burp Suite is one of the most popular web application security testing software. It is
used as a proxy, so all the requests from the browser with the proxy pass through it.
And as the request passes through the burp suite, it allows us to make changes to
those requests as per our need which is good for testing vulnerabilities like XSS or
SQLi or even any vulnerability related to the web.
To use burp suite:
Read this to learn how to setup burp suite.
burpsuite
Go to the Proxy tab and turn the interceptor switch to on.
Now visit any URL and it could be seen that the request is captured.

SQL Injection :-
SQL injection is a technique used to exploit user data through web page inputs by
injecting SQL commands as statements. Basically, these statements can be used

SQL injection is a code injection technique that might destroy your database.
SQL injection is one of the most common web hacking techniques.
SQL injection is the placement of malicious code in SQL statements, via web
page input.
jSQL Injection is a lightweight application used to find database information from a
distant server. jSQL is free, open source and cross-platform (Windows, Linux, Mac
OS X, Solaris).

Installed size: 7.74 MB


How to install: sudo apt install jsql-injection

WP Scan :-
Wpscan is a vulnerability scanning tool, which comes pre-installed in Kali Linux. This
scanner tool scans for vulnerabilities in websites that run WordPress web engines.

a particular site.

Usage of Tool:

Open a terminal by pressing CTRL+ALT+T. The basic syntax of the wpscan


command is given below:
wpscan --url <https://recon_site.com>
The wpscan works for both HTTP and HTTPS sites. If not provided, it takes HTTP
by default.

Features and Utilities:

Checking the version of WordPress used and associated vulnerabilities for that
version.
Checks for database dumps that may be openly accessible.
Checks for the WordPress README file.
Brute force usernames and passwords if possible.
Checks for publicly available or backed up wp-config.php files
Checks for themes and plugins used on the site and possible vulnerabilities for
them.
Performs media file enumeration as well.
Checks for exposed error log files, if available.
Also, enumerates possible directory lists.

05. Web Application Analysis

Web Application is a dynamic response web page that helps in a better and
interactive client-server relationship. These tools identify and access websites
through the browser to check any bug or loophole present, which could lead any
information or data to lose.
For example, there is a website with a payment gateway then these web analyzers
check if sufficient authentication and authorization present of the site.
These web application uses:
Google Dark :-
A Google dork query, sometimes just referred to as a dork, is a search string or custom
query that uses advanced search operators to find information not readily available
on a website. Google dorking, also known as Google hacking, can return information
difficult to locate through simple search queries.

Google dorking, also known as Google hacking, can return information difficult to
locate through simple search queries. This includes information not intended for
public viewing, but that is inadequately protected and can, therefore, be "dorked" by
a hacker.

A Google dork query, sometimes just referred to as a dork, is a search


string or custom query that uses advanced search operators to find
information not readily available on a website.

06. Password Attack

Password attacks are malicious ways hackers attempt to gain access to your
account. Examples of password attacks include brute-force attacks, credential
stuffing, and password spraying.

Types of password attacks

Phishing Attacks.
Credential Stuffing Attacks.
Brute Force Attacks.
Dictionary Attacks.
Password Spraying Attacks.
Keylogger Attacks.
Man-In-The-Middle Attacks.
Rainbow Table Attacks.

Following tools are used to Password Attack


1. Cewl
2. Hydra
3. Ncrack
4. Word list
1. cewl
CeWL (Custom Word List generator) is a ruby app which spiders a given URL, up to
a specified depth, and returns a list of words which can then be used for password
crackers such as John the Ripper. Optionally, CeWL can follow external links.

CeWL can also create a list of email addresses found in mailto links. These email
addresses can be used as usernames in brute force actions.

Another tool provided by CeWL project is FAB (Files Already Bagged). FAB extracts
the content of the author/creator fields, from metadata of the some files, to create lists
of possible usernames. These usernames can be used in association with the
password list generated by CeWL. FAB uses the same metadata extraction
techniques that CeWL. Currently, FAB process Office pre 2007, Office 2007 and PDF
formats.

CeWL is useful in security tests and forensics investigations. CeWL is pronounced

Installed size: 80 KB
How to install: sudo apt install cewl

07 Wireless Attacks
A wireless attack is a malicious action against wireless system information or wireless
networks; examples can be denial of service attacks, penetration, and sabotage.
common types of wireless network attacks
packet sniffing.
rogue access points.
Wi-Fi phishing and evil twins.

spoofing attacks.
encryption cracking.
MitM attacks.
DoS attacks.
Wi-Fi jamming.

Packet Sniffing
Networks are designed to facilitate and accelerate the traffic of information.
In order to achieve this goal, the information is sent in packets across both
wired and wireless networks. Due to the nature of wireless networks,
these packets are sent through the air. As a result, it is very easy to capture
them.
A great deal of traffic is sent through wireless networks, such
as RTP, SNMP or HTTP. The common feature of these is the fact that they
are in plain text. Which means, one can easily read them with the help of
free access tools like Wireshark. As a result, someone with malicious
intentions can simply steal your passwords and similar sensitive
information.
If you want to protect your wireless network against packet sniffing, you
should invest in encryption solutions.

08 Reverse Engineering

Reverse engineering covers a broad range of areas, including


decompiling and disassembling of executable files and libraries,
and analysis of system data. In the field of computer security,
reverse engineering is used to study malware activity and create
tools to neutralize it.
There are various Reverse Engineering tools, like debuggers, Valgrind, PEID,
JAVAsnoop, Ollydbg and othes, that can help reverse engineer programs or
applications.

Debugging

Reverse engineering can either be performed statically or dynamically. Static reverse


engineering involves looking at the assembly code of an application and attempting
to understand its function without running it. Dynamic analysis, on the other hand,
runs the application code and observes its results.

9. Social Engineering

Social engineering is the art of manipulating, influencing, or deceiving you in order to


gain control over your computer system. The hacker might use the phone, email,
snail mail or direct contact to gain illegal access. Phishing, spear phishing, and CEO
Fraud are all examples.
Social engineering refers to all techniques aimed at talking a target into
revealing specific information or performing a specific action for illegitimate
reasons.

The term "social engineering" is derived from the


words "social" and "engineering," where "social" refers to personal, professions,
and our day-in-day-out lives. On the other hand, "engineering" involves
comprehensive processes to complete a work such that the defined goal is met. In
other words, it is a set of methods.

Social Engineering Toolkit

Social engineering toolkit is a free and open-source tool which is used for social
engineering attacks like phishing, sending SMS, faking phone, etc.

Uses of Social Engineering Toolkit


There are various uses of social engineering toolkit:

1. Web Attack
2. Mass Mailer Attack
3. Phishing Attacks
4. Create a Payload and Listener

1. Web Attack

In SET, a web attack is a module. This module combines various options to attack the
victim remotely. Using this module, we can create a payload and distribute the payload
to our victim browser using the Metasploit browser exploit. Web attack
has Credential Harvester method that allows us to clone any website for a phishing
attack and send the link of that webpage to the victim to get information from user and
password fields.

2. Phishing Attacks

We can use the Social Engineering Toolkit to perform phishing attacks on our victims.
Using SET, we can create phishing pages for a variety of websites, including Google,
Facebook, Instagram, etc. SET will generate a link of the option which we have
selected, and then we can send that URL to the victim once the victim clicks on that
URL and he/she will see a legitimate webpage of a real website that is essentially a
phishing page. Once he/she has entered his/her ID password, we will get that ID
password on our terminal screen, this is how a phishing attack using SET works.
Phases in Social Engineering
There are various phases of social engineering before the final result is obtained. This
includes:

1. Research Phase
2. Hook Phase
3. Play Phase
4. Exit Phase

Research Phase
In the research phase, the information related to the goal is collected. Whether the
objective is a firm or an individual, the first phase is the same. There are so many ways
by which attackers can get the information related to their targets.

Hook Phase
The Hook phase is the second phase of the attack. In this phase, the attacker initiates
a discussion with their victim target.

After the hook, the phase is the phase of play that strengthens the connection between
the attacker and the target. The attacker takes advantage of this opportunity to
investigate getting the information they desire.

Exit Phase
This is the final phase, and the attacker must be careful not to set up a situation that
would make the target suspect in any manner. The idea is to exit the target without
giving any indication of action.

10. Sniffing & Spooling

Sniffing is the process in which all the data packets passing in the network
are monitored. Sniffers are usually used by network administrators to monitor
and troubleshoot the network traffic. Whereas attackers use Sniffers to monitor
and capture data packets to steal sensitive information containing password
and user accounts. Sniffers can be hardware or software installed on the
system.
Spoofing is the process in which an intruder introduces fake traffic and
pretends to be someone else (legal source or the legitimate entity). Spoofing
is done by sending packets with incorrect source address over the network.
The best way to deal and tackle with spoofing is to use a digital signature.

Spoofing is when an attacker creates TCP/IP using another person's IP address. A


sniffer software is placed between two interactive endpoints in packet Sniffing, where
the attacker pretends to be one end of the connection to the target and snoops on data
sent between the two points.
The difference between sniffing and snooping?

Sniffing and snooping should be synonyms. They refer to listening to a conversation.


For example, if you login to a website that uses no encryption, your username and
password can be sniffed off the network by someone who can capture the network
traffic between you and the web site.

Wireshark :
Wireshark is a network protocol analyzer that is termed to be the most used and best
tool around the word. With Wireshark, you can see what is happening in your network
and apply filters to get the most efficient results for what you are looking for. In Kali,
Linux Wireshark is already installed and can be located under Applications sniffing
and spoofing Wireshark.

Wireshark is a GUI based tool, so once you click on the icon Wireshark GUI
will open
Once the GUI loads you can see several interfaces like Ethernet, Wi-Fi, Bluetooth,
and so on, based on your connection to the network you can choose the interface
and start capturing the network traffic. In this case, we are on Ethernet(eth0), so
select the eth0 interface and click on the start capturing packets icon which is located
in the top left corner.
Once you start capturing packets it will look something like this :

You can also apply specific filters for better searching, for example, if you want to
track only HTTP requests you can use apply a display filter bar and apply all the
filters you need for better track results.

***

You might also like