Intern
Intern
surat
By
Mangukiya Zeelkumar Maheshbhai
Enrolment No:202103103510419
Guided by
Mr. Punit korat(CEO)
Designation
• No of Employees: 26
• Technologies:
• Address: 4030, Central Bazzar, Varachha Main Rd, Surat, Gujarat 395006
• Starting Year:2015
About Internship Area
Live Project NO
(Yes/No)
Working in Individual
Team/Individual
Learning Outcome
• DMARC
1. DMARC (Domain-based Message Authentication, Reporting, and
Conformance) is an email authentication protocol designed to give domain
owners control over how their emails are authenticated and protected
against fraudulent use, such as phishing and email spoofing.
2. Define how emails from their domain should be authenticated (using SPF
and DKIM)
1. Set up SPF and DKIM: Ensure your domain has proper SPF and DKIM
records.
2. Create a DMARC Record: This is a TXT record added to your DNS
that defines your DMARC policy.
3. Monitor with ‘none’ Policy: Start by setting the policy to ‘none’ to
monitor mail flow without taking action.
4. Analyze Reports: DMARC generates XML reports that can be analyzed
to identify spoofing attempts and authentication failures.
5. Gradually Move to ‘quarantine’ or ‘reject’: Based on the reports,
tighten your policy by moving to ‘quarantine’ or ‘reject’ to fully protect
your domain.
• Benefits of DMARC
• Mitigation Strategies
Solution:
Open up your .htaccess file. You may have to turn on the ‘show hidden files’ within
file manager or your FTP client to locate this file.Inside your .htaccess file, paste the
following code:
Plain text
Copy to clipboard
Open code in new window
EnlighterJS 3 Syntax Highlighter
# Block WordPress xmlrpc.php requests
<Files xmlrpc.php>
order deny,allow
deny from all
allow from xxx.xxx.xxx.xxx
</Files>
Week 5&6 Learning
• Mitigation Strategies
• Burp Suite
• Nmap
• WPScan
• nmap
Conclusion
• Through the 3rd and 4th week, I learned how attackers could exploit
XML-RPC vulnerabilities to launch brute force, DoS, and DDoS
attacks, and how to implement effective mitigation strategies.