Intenship Domain
Intenship Domain
BACHELOR OF TECHNOLOGY
In
20ME1A4657
Under Supervision of
Mr.P.V.Kishore Kumar
Assistant Professor
1
Ramachandra College of Engineering (Autonomous)
Approved by AICTE, Permanently Affiliated to JNTUK, Recognized by UGC 2(f) & 12(B),
NH-16, Bypass Road, Vatluru (V), Eluru – 534007, Eluru Dt., A.P.
CERTIFICATE
External Examiner
Declaration
we hereby declare that the internship on “cyber security” submitted us to Jawaharlal Nehru
Technological University Kakinada in partial fulfilment of the requirements of IV B.Tech I
semester of bachelor of technology in CSE (CS).this internship work carried by us under the
supervision of Dr. Shameena Begum , Professor in CSE(CS).
I would like to take the opportunity to express our deep gratitude to all the people who have
extended their cooperation in various ways during my internship. It is my pleasure and
responsibility to acknowledge the help of all those individuals.
I have extended our sincere thanks to Dr.SHAMEENA BEGUM, Professor and Head of the
Department CSE-CYBER SECURITY for helping me in the successful completion of my
internship.
I would like to express my deepest gratitude to Dr. V. Srinivasa Rao, Principal, Ramachandra
College of Engineering, Eluru for his valuable suggestions during the preparation of draft in our
document.
I sincerely thank all the faculty members and staff of the Department of CYBER SECURITY
for their valuable advices, suggestions and constant encouragement which played a vital role in
carrying out my internship.
Finally, I thank one and all who directly or indirectly helped me to complete my internship
successfully.
20ME1A4657
ABSTRACT
The internet has considerably enhanced various business critical operations of company’s in
different industry sectors across the globe. However, as more and more organizations become
partially or completely dependent on the internet, computer security and the serious threat of
computer criminals comes to the foreground. The explosive growth of the Internet has brought
many good things: electronic commerce, easy access to vast stores of reference material ,
collaborative computing, e-mail, and new avenues for advertising and information distribution ,to
name a few.
As with most technological advances, there is also a dark side: criminal hackers . Governments,
companies, and private citizens around the world are anxious to be a part of this revolution, but
they are afraid that some hacker will break into their Web server and replace their logo with
pornography, read their e-mail, steal their credit card number from an on-line shopping site, or
implant software that will secretly transmit their organization’s secrets to the open.Internet . With
these concerns and others, the ethical hacker can help.
Unfortunately, most organizations across the globe continue to remain oblivious of the threat .
posed by computer criminals, corporate espionage and cyber terrorism. Ethical Hacking attempts
to pro-actively increase security protection by identifying and patching known security
vulnerabilities on systems owned by other parties.
Organization Information
ST7 Surveillance Solutions Pvt.Ltd is tech based platform and the only private player that gives
live cybercrime solutions .
ST7 surveillance solutions are based on providing the best enhanced services for computers or for
any digital devices and anti-hack services and awareness training on cyber attacks, cyber threats.
ST7 Surveillance Solutions is going to provide online LIVE ethical hacking courses & ST7
Surveillance Solutions is the only company giving cyber crime solutions like (honey-trap, spy-
wares, spoofing attacks, social engineering and many more hackers traps) with 100% success rate.
ST7 Surveillance Solutions is going to provide application security service, data protection service,
networks security service, threat protection service, cyber forensics expert solutions and many
more digital security solution.
INDEX
S. No Contents Page No
1 Internship Certificate
23 Conclusion 56
INTERNSHIP CERTIFICATE
Learning Objectives/Internship Objectives
● Internships are generally thought of to be reserved for college students looking to gain experience
in a particular field. However, a wide array of people can benefit from Training Internships in order
to receive real world experience and develop their skills.
● An objective for this position should emphasize the skills you already possess in the area and
your interest in learning more.
● Internships are utilized in a number of different career fields, including architecture, engineering,
healthcare, economics, advertising and many more.
● Some internships are used to allow individuals to perform scientific research while others are
specifically designed to allow people to gain first-hand experience working.
● Utilizing internships is a great way to build your resume and develop skills that can be emphasized
in your resume for future jobs. When you are applying for a Training Internship, make sure to
highlight any special skills or talents that can make you stand apart from the rest of the applicants
so that you have an improved chance of landing the position.
WEEKLY OVERVIEW OF INTERNSHIP ACTIVITIES
Week Date Day Name of topic / Module completed
26-5-2023 Friday Module1 – Introduction to Cybersecurity
CYBER SECURITY
INTRODUCTION
1.The method of securing internet connecting system against threat is called as cyber security .
2.Cyber security is also called as information technology system security and electronic
information security.
i) Network Security
ii) Application Security iii) Data Security
iv) Mobile Security
v) Cloud Security
Network Security
Securing computers that are connected to a single network.Network security is any activity
designed to protect the usability and integrity of your network and data. It includes both hardware
and software.
Application Security
Giving Security to apps is called Application Security.Application security describes security
measures at the application level that aim to prevent data or code within the app from being stolen
or hijacked.
Data Security
Data security is the process of safeguarding digital information throughout its entire life cycle to
protect it from corruption,theft, or unauthorized access.
Mobile Security:
To protect data from email-based cyber threats such as malware, identity theft and phishing
scams,organizations need to monitor email traffic proactively.
Cloud Security:
It is a collection of procedures and technology designed to address external and internal threats to
business security. Cloud security refers to the technologies, policies, controls, and services that
protect cloud data, applications, and infrastructure from threats.
Cloud Security, also known as cloud computing security, is a collection of security measures
designed to protect cloud-based infrastructure, applications
Chapter-2
Ethical Hacking
Introduction
Cybersecurity is the practice of protecting computer systems, networks, and data from unauthorized
access, attacks, damage, or theft. It encompasses various technologies, processes, and practices
designed to safeguard information and systems from cyber threats.
Here's an introductory breakdown of cybersecurity:
Threat Detection and Response: It's essential to continuously monitor systems for any
suspicious activities or potential security breaches. Cybersecurity professionals employ tools and
technologies to detect, analyze, and respond to security incidents promptly.
Risk Management: Assessing and managing risks is a crucial aspect of cybersecurity. This
involves identifying vulnerabilities, evaluating their potential impact, and prioritizing measures to
mitigate these risks effectively.
Education and Training: Human error is often a significant factor in cyber breaches.
Therefore, educating users about security best practices, providing training on how to recognize
phishing attempts, and promoting a securityconscious culture within organizations are essential
elements of cybersecurity.
Compliance and Regulation: Many industries have specific regulations and compliance
standards related to cybersecurity (such as GDPR, HIPAA, etc.). Adhering to these standards is
crucial to ensure the protection of sensitive information and avoid legal consequences.
Ethical hackers use their expertise to simulate real-world attacks, exposing weaknesses in systems
and networks. By discovering these flaws before malicious actors exploit them, ethical hacking
contributes to fortifying defenses. This collaboration ensures proactive measures patching
vulnerabilities and implementing robust security protocols ultimately bolstering cybersecurity
posture. Ethical hacking serves as a proactive defense mechanism, enhancing the resilience of
cybersecurity measures against evolving threats and potential breaches.Ethical hacking operates
within a legal framework governed by cyber laws, ensuring that hacking activities are conducted
responsibly, lawfully, and with explicit permission. These laws vary across countries but generally
encompass:
→Scope Limitations: It defines the boundaries within which ethical hackers can operate,
specifying the systems, networks, or applications that can be tested and the methods allowed.
→Data Protection: Cyber laws enforce strict regulations regarding the handling and protection
of sensitive data.
Ethical hackers must adhere to privacy laws and avoid accessing, tampering, or exposing private
information during their assessments.
→Reporting and Compliance: Ethical hackers are typically required to document their
findings accurately, report vulnerabilities to the system owners, and comply with any post-
assessment protocols or actions.
→Liabilities and Responsibilities: Cyber laws outline liabilities and responsibilities for both
the ethical hacker and the system owner, ensuring accountability and mitigating risks associated
with hacking activities.
Understanding and adhering to these cyber laws is crucial for ethical hackers to conduct their
assessments legally and responsibly. Compliance with these laws ensures that ethical hacking
activities contribute positively to enhancing cybersecurity without infringing on legal boundaries
or causing unintended harm.
Cybersecurity laws and regulations aim to establish legal frameworks that govern the
protection of digital systems, data, and networks. These laws vary globally and cover
several aspects:
1.Data Protection and Privacy Laws: Regulations like GDPR (General Data Protection
Regulation) in the EU or CCPA (California Consumer Privacy Act) in the United States mandate
how personal data is collected, processed, and stored. They also outline individuals' rights
regarding their data.
2.Cybercrime Laws: These laws address various cyber offenses, such as hacking, identity
theft, malware distribution, and cyber fraud. They outline penalties for illegal activities and
unauthorized access to computer systems.
4.National Security Laws: Some laws focus on protecting a country's critical infrastructure
from cyber threats. They often involve regulations related to national security, espionage, and
protecting government systems.
5.Incident Notification Laws: These laws mandate that organizations report data breaches
or cyber incidents within a specified timeframe. They aim to improve transparency and allow for a
timely response to mitigate damages.
CHAPTER-3
INFORMATION SYSTEM
Data is the raw material that can be processed by any computer system.
Information:
Information refers to the data that should be processed in such a way that it should be meaningful
to the people who receive it.
Information system
People: Peoples are the most essential part of the information system because without
them the system cannot be operated correctly.
Software: It is a set of instruction that tells the hardware what to do. It can be used to
organize, process and analyze data in the information system.
Data: Data is a collection of facts. Information systems work with data. These data can
be aggregated, indexed, and organized into tables and files together to form a database.
These databases can become a powerful tool for every businesses information system.
Network: It includes internet, intranet, extranet to provide successful operations for all
types of organizations and computer-based information system
Procedures: It specifies the policies that govern the operation of an information system.
It describes how specific method of data are processed and analyzed to get the answers for
which the information system is designed
1)Organization Dimension
2)Management Dimension
3)Technological Dimension
Organization Dimension:
Management Dimension:
The management dimension of information systems involves leadership, strategy, and management
behavior. Information systems supply tools and information needed by managers to allocate,
coordinate and monitor their work, make decisions, create new products, and services and make
long-range strategic decisions.
Technological Dimension:
The technology dimension includes everything that is related to technology resources and that are
required for the growth of a company. These may include computer software, hardware, different
applications, the internet, and so on and so forth.
CHAPTER-4
5.Review
Vulnerability
Malware
Ransomware
Steganography
Cryptography
Penetration Testing
Vulnerability:
Malware:
It is a malicious software ,which is delivered over a network that steals sensitive
data like personal information and infects the whole system.
Ransomware:
Ransomware is a type of malware that prevents you from accessing your computer
(or the data t that is stored on it. The computer itself may become locked, or the data
on it might be stolen, deleted or encrypted.
Steganography:
Steganography is the practice of concealing information within another message or
physical object to avoid detection. Steganography can be used to hide virtually any
type of digital content, including text, image, video, or audio content. That hidden
data is then extracted at its destination.
Cryptography:
Cryptography is the process of hiding or coding information so that only the person
a message was intended for can read it. The art of cryptography has been used to
code messages for thousands of years and continues to be used in bank cards,
computer passwords, and ecommerce.
Penetration Testing:
Penetration testing (or pen testing) is a security exercise where a cyber-security
expert attempts to find and exploit vulnerabilities in a computer system. The purpose
of this simulated attack is to identify any weak spots in a system's defenses which
attackers could take advantage of.
Facts of Cyber Attacks
2. The global average cost of data breach is around 3.9 million dollars.
5. Most of the companies takes nearly 6 months to detect the data breach even
if it is a major one also.
6. Since Covi 19 there is an increase of 300% of cyber crimes because of
increase in Staff working from home.
7. 21% files are not at protected.
step-1:Download the Customized Kali Linux: Visit the Z-Security website or the platform
where they host the customized Kali Linux distribution. Once you've found the download link,
download the file to your local system.
It will typically be in the form of an ISO image.
step-2:Extract the ISO file using WinRAR: Right-click on the downloaded file, select "Extract
Here" or open it with WinRAR. This will extract the contents of the ISO file to a folder on your
computer.
step-3:Install VMware: If you haven't already, download and install VMware Workstation or
VMware Player, depending on your preference. You can get the installer from the VMware
website.
During the installation process, you'll be prompted to set up various settings such as language,
location, keyboard layout, and user account details.
Complete Installation: Once the installation is complete, restart the virtual machine.
fig3:Install KaliLinux
Post-Installation:
step-4:Customize as Needed: Since this is a customized version by Z-Security, it might include
specific tools or configurations. Explore the system to see what modifications have been made and
how they differ from the standard Kali Linux distribution.
step-7:Update and Upgrade: Open a terminal and run the following commands to update and
upgrade sudo apt update sudo apt upgrade
step-8:Explore and Use: Familiarize yourself with the customized features and tools that Z-
Security has integrated into this Kali Linux build.
DATA RECOVERY
We use “Disk drill application” to recover files. Installation of disk drill
https://www.cleverfiles.com/data-recovery-software.h
Step-2:Open the disk drill downloaded folder Step-3 :Click “Yes” & click
on “install”
Data Recovery:
Step-4:Open Disk drill & click “yes” Step-5:Click “Search for Lost data”
PHOTO FORENSICS
FotoForensics provides budding researchers and professional investigators access to cutting- edge
tools for digital photo forensics. FotoForensics is designed and organized for rapid analysis. With
a little experience, an analyst should be able to evaluate a picture in minutes.
Step-2:Upload a url.
FIG1:PENTEST-TOOLS WEBSITE
LOGIN WITH YOUR GOOGLE ACCOUNT
https://www.filescan.io/scan
It uses adaptive threat analysis technology to detect evasive malware and extract relevant Indicators
of Compromise (IOCs).
CHECKING OF PASSWORDS
We use “ https://www.mobilefish.com/services/steganography/steganography.php ”
Step-1:Open the url upload the cover file and image file Step-2:Enter passphrase and code
FIG1:UPLOADING COVER FILE AND IMAGE FILE FIG2:ENTERING PASSPHRASE AND CODE
FIG3:SCAN RESULTS
CHAPTER-16
STEGANOGRAPHY(USING LINUX COMMAND)
Hiding data within an image sounds like something out of a spy movie. You don’t have to be a
modern James Bond to learn this skill known as steganography.
Steganography is used in many capture the flag challenges in cybersecurity and hacking events.
In this article, we will discuss how to use Steghide on Kali Linux to conceal and extract hidden
data within an image.
Prerequisites
● Kali Linux
● Text File
● Internet Connection
1. Install Steghide
You’ll first need to install Steghide. To see if you have Steghide installed you can run the following
command.
mrkmety@kali:~$ which steghide mrkmety@kali:~$
If nothing is returned you will need to run the following command to install Steghide.
Processing triggers for man-db (2.9.1-1)... Processing triggers for kali-menu (2020.2.1)...
mrkmety@kali:~$
You should familiarize yourself with the man page and help section that is available after installing
Steghide. While we will cover the required commands and flags to accomplish basic embedding
and extraction of data from an image, it’s best to have a grasp on what a program does and the
available flags/options.
Run the following command to pull up the man page.
Move on to the next step once you are familiar with how the program works.
3. Find an Image
You are now ready to find an image in which you will embed data.
Steghide supports JPEG and BMP image file types. Once you have an image, ensure it is available
on your Kali machine.
In this example, we will use the first JPEG image located in this article. Feel free to grab that image
or any other JPEG or BMP file.
The filename in this example will be named “regular_image.jpeg”.
4. Have Your Secret Text Ready
fig1:Classified information
Steghide does not have restrictions on the type of format secret data. You can embed anything
you’d like in the image.
We are going to create a text file called “super_secret_stuff.txt” that we will use to embed in the
image. You can use any text editor you’d like or you can run the following command to quickly
create a text file.
You can check to see if the text file has been created and the contents by running the following
command.
This is a library for retrieving phone number details using the Truecaller API. It provides a simple
and convenient way to access information about phone numbers in your Node.
Description
TruecallerJS is built to simplify the process of fetching phone number details. With this library,
you can easily integrate Truecaller functionality into your Node.js, JavaScript, and TypeScript
applications. It abstracts the complexities of interacting with the Truecaller API and provides a
streamlined interface for fetching and processing phone number information.
Features
● Phone Number Lookup: Retrieve detailed information about a phone number, including the
owner's name, location, and more.
● Support for Node.js, JavaScript, and TypeScript: TruecallerJS can be used in Node.js projects, as
well as in JavaScript and TypeScript applications.
● Simple and Lightweight: TruecallerJS is designed to be easy to use and lightweight.
Installation
You can install TruecallerJS using npm:
● truecallerjs -s [number]: Use this command to search for a phone number and retrieve the caller
name and related information.
● truecallerjs --bulksearch, --bscommand is used to performing bulk number searches using the
Truecaller service. It allows you to search for multiple phone numbers at once, making it
convenient for processing large sets of phone numbers in a single request
● truecallerjs --bulksearch, --bs: Use this command to perform a bulk number search.
● Additional options include --raw, --name, --email, --json, --xml, --yaml, --text, --nc, --
installationid, -verbose, and --help.
For example:
~$ truecallerjs -s +9199123456789 --json
{
...
"name":"Sumith Emmadi"
...
}
~$ truecallerjs -s +9199123456789 --name Name : Sumith Emmadi
Example for bulk search
truecallerjs --bulksearch
<phone_number_1>,<phone_number_2>,<phone_number_3>,...,<phone_number_n>
Replace <phone_number_1>, <phone_number_2>, ..., <phone_number_n> with the actual phone
numbers you want to search. Separate each phone number with a comma.
~$ truecallerjs --bs 9912345678,+14051234567,+919987654321
CHAPTER-18
Wifi Cracking
Aircrack-ng is a package of Wi-Fi network security assessment tools. It has a detector, a packet
sniffer, WPA/WPA2PSK, and a WEP cracker and analyzer for 802.11 Wireless LANs.
With the help of Aircrack-ng, a penetration tester can focus on Monitoring, Attacking, Testing, and
Cracking aspects of the Wi-Fi Security.
Monitoring includes Packer Capturing and exporting the data to text files for processing by any
third-party tool. Attacking includes replay attacks, deauthentication, evil-twin attacks, and packet
injection attacks.
Testing includes the testing of the Wi-Fi cards and driver capabilities based on the capture and
injections. Finally Cracking includes the ability to crack the WEP and WPA PSK keys.
airodump-ng wlan0mon
#3. Whaling
Whaling attacks target senior management and other highly privileged roles. The ultimate goal of whaling is
the same as other types of phishing attacks, but the technique is often very subtle. Senior employees
commonly have a lot of information in the public domain, and attackers can use this information to craft
highly effective attacks.
Typically, these attacks do not use tricks like malicious URLs and fake links. Instead, they leverage highly
personalized messages using information they discover in their research about the victim. For example,
whaling attackers commonly use bogus tax returns to discover sensitive data about the victim and use it to
craft their attack.
INSTALLATION OF MAXPHISHER
GOOGLE:-- https://github.com/KasRoudra/MaxPhisher.git {maxphisher}
python3 maxphisher.py
Press the opt like 01/02/03/ (inorder to send the link like above mode)
Right now pressing
Press 02
__ __ ____ _ _ _
| \/ | __ ___ _| _ \| |__ (_)___| |__ ___ _ __
| |\/| |/ _` \ \/ / |_) | '_ \| / __| '_ \ / _ \ '__|
| | | | (_| |> <| __/| | | | \__ \ | | | __/ |
|_| |_|\__,_/_/\_\_| |_| |_|_|___/_| |_|\___|_|
[v1.1]
[By KasRoudra]
[•] Initializing PHP server at localhost:8080....
[+] PHP Server has started successfully!
[•] Initializing tunnelers at same address.....
[+] Your urls are given below :
╭─ CloudFlared─────────────────────────────────────────────────╮
│ URL : https://losing-fist-employee-many.trycloudflare.com │
│ MaskedURL : https://[email protected] │
╰─────────────────────────────────────────────────────────╯
╭─ LocalHostRun
─────────────────────────────────────────────── ──────────╮
│ URL : https://8af2688124f317.lhr.life │
│ MaskedURL : https://[email protected] │
╰────────────────────────────────────────────────────────╯
[?] Wanna try custom link? [y or press enter to skip] : (enter)
Send any above link to get the pics in media
INSTALLATION OF MAXPHISHER
Press n
__ __ ____ _ _ _
| \/ | __ ___ _| _ \| |__ (_)___| |__ ___ _ __
| |\/| |/ _` \ \/ / |_) | '_ \| / __| '_ \ / _ \ '__|
| | | | (_| |> <| __/| | | | \__ \ | | | __/ |
|_| |_|\__,_/_/\_\_| |_| |_|_|___/_| |_|\___|_|
[v1.1]
[By KasRoudra]
[01] Login
[02] Image
[03] Video
[04] Audio
[05] Location
[06] IP Tracker
[07] Device
[08] ClipBoard
[a] About [m] More tools [0] Exit [?] Select one of the options > 02
Press the opt like 01/02/03/ (inorder to which u want to hack)
Press 02
[01] Jio Recharge
[02] Festival
[03] Youtube Live
[04] Online Meeting
[a] About [x] Main Menu [0] Exit
[?] Select one of the options > 02
Press the opt like 01/02/03/ (inorder to send the link like above mode)
Right now pressing
Press 02
__ __ ____ _ _ _
| \/ | __ ___ _| _ \| |__ (_)___| |__ ___ _ __
| |\/| |/ _` \ \/ / |_) | '_ \| / __| '_ \ / _ \ '__|
| | | | (_| |> <| __/| | | | \__ \ | | | __/ |
|_| |_|\__,_/_/\_\_| |_| |_|_|___/_| |_|\___|_|
[v1.1]
[By KasRoudra]
[•] Initializing PHP server at localhost:8080....
[+] PHP Server has started successfully!
[•] Initializing tunnelers at same address.....
[+] Your urls are given below :
╭─CloudFlared────────────────────────────────────────────╮
│ URL : https://losing-fist-employee-many.trycloudflare.com │
│ MaskedURL : https://[email protected] │
╰────────────────────────────────────────────────────╯
╭─ LocalHostRun ──────────────────────────────── ──────────╮
│ URL : https://8af2688124f317.lhr.life │
│ MaskedURL : https://[email protected] │
╰────────────────────────────────────────────────────╯
[?] Wanna try custom link? [y or press enter to skip] : (enter)
REFLECTION ON THE INTERNSHIP
An ethical hacking internship is a transformative journey into the complex and critical realm of
cybersecurity. It offers a multidimensional experience, amalgamating theoretical knowledge with
practical application. This immersive opportunity equips individuals with a profound
understanding of vulnerabilities within digital systems and networks. It's a hands-on exploration of
ethical hacking methodologies, emphasizing the significance of proactive defense against cyber
threats.
Throughout this internship, I had the chance to immerse myself in various aspects of cybersecurity.
From learning about penetration testing to dissecting malware and understanding encryption
protocols, every facet illuminated the intricate layers of digital security. The experience was not
just about mastering tools and techniques but also about cultivating a hacker's mindset—a holistic
approach to anticipate and counteract potential breaches.
One of the most enriching aspects was the exposure to real-world scenarios. Working on simulated
environments and conducting ethical hacking exercises helped in comprehending the gravity of
vulnerabilities and the urgency in fortifying systems. Collaborating with seasoned professionals
and peers provided diverse perspectives and insights, fostering a collaborative learning
environment.
Moreover, ethical hacking isn't merely a technical pursuit; it's deeply rooted in ethics and
responsibility. The internship underscored the importance of ethical boundaries, emphasizing the
ethical use of acquired skills for the greater good. It instilled a sense of ethical consciousness,
emphasizing the need to uphold integrity, confidentiality, and respect for privacy while navigating
the cybersecurity landscape.
This internship has not just augmented my technical acumen but has also honed my critical
thinking, problem-solving abilities, and ethical decision-making skills. It has sparked a passion
within me to contribute ethically to the everevolving field of cybersecurity, safeguarding digital
infrastructures and advocating for a secure cyberspace for all.
CONCLUSION
An ethical hacking internship marks the culmination of an enriching journey into the intricate world
of cybersecurity. It represents not just the end of a learning phase but the beginning of a lifelong
commitment to ethical practices in safeguarding digital landscapes.
Throughout this experience, I've acquired a wealth of technical knowledge, mastering tools and
methodologies crucial in identifying vulnerabilities and fortifying systems. However, beyond the
technical prowess, this internship has ingrained in me a profound ethical understanding a sense of
responsibility and integrity that forms the bedrock of ethical hacking.
The conclusion of this internship isn't merely an endpoint but a launchpad toward a career dedicated
to ethical cybersecurity practices. It's a commitment to applying the skills and insights gained
ethically, ensuring the protection of digital assets and advocating for a secure cyberspace.
As I move forward, I carry with me not just technical expertise but also a deep-seated ethical
consciousness. This internship has instilled in me the values of integrity, confidentiality, and ethical
decision-making—values that will guide every step I take in the cybersecurity domain.
In essence, the conclusion of this ethical hacking internship marks not just the end of a chapter but
the commencement of a journey committed to utilizing hacking skills ethically, contributing
positively to the cybersecurity landscape, and fortifying digital realms for a safer and more secure
future.