0% found this document useful (0 votes)
57 views6 pages

Internship Tasklist For Red Teaming

The document outlines the internship prerequisites and tasks for the HACK SECURE Cyber Security internship starting in January 2025. Interns are required to update their LinkedIn profiles, complete specified tasks, and obtain validation from mentors before submission. Key tasks include red teaming exercises, ethical hacking projects, and the use of various security tools and techniques.

Uploaded by

bhavs329
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views6 pages

Internship Tasklist For Red Teaming

The document outlines the internship prerequisites and tasks for the HACK SECURE Cyber Security internship starting in January 2025. Interns are required to update their LinkedIn profiles, complete specified tasks, and obtain validation from mentors before submission. Key tasks include red teaming exercises, ethical hacking projects, and the use of various security tools and techniques.

Uploaded by

bhavs329
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

HACK

SECURE

INTERNSHIP TASKLIST
RED TEAMING

WEB ETHICAL CYBER


EXPLOIT HACKING SECURITY

2025
JANUARY
BATCH
Internship Pre-requisites before starting your
tasks:
HACK
SECURE

1. LinkedIn Profile Update: Ensure that your LinkedIn profile is


updated to reflect your technical skills, and update your
experience section to include "HACK SEC Cyber Security Intern."

2. LinkedIn Post: It's not mandatory to post the offer letter on


LinkedIn, but if you wish at the end of the internship, you can
post your offer letter and tag us.

3. Completion of Tasks: Complete the required tasks as


specified in this Task List.

4. Proof of Work: At HACK SECURE, we value Proof of Work


(POW). You need to get validated from your mentor before you
submit your respective tasks in the Task Submission Forms.

Note: Do not upload your Report in LinkedIn, this would allow


others to copy your work. If the team finds out that you have
posted your report in LinkedIn, your internship would be
terminated.

After completing all the above steps, proceed with your task
completion. Kindly note that all the details and reports you
submit will be thoroughly verified before you receive the
Certificate.
TASK LEVEL
INTERMIDIATE
1). Find all the ports that are open on the website
http://testphp.vulnweb.com/

2). Brute force the website http://testphp.vulnweb.com/ and find

the directories that are present in the website.

3). Make a login in the website http://testphp.vulnweb.com/ and

intercept the network traffic using Wireshark and find the

credentials that were transferred through the network.

1. Red Team Fundamentals

Red Team Goals: Simulate real-world attacks to test

security.

Attack Vectors: Focus on phishing, social engineering,

and network exploitation.

Tools: Learn to use Metasploit, Cobalt Strike, etc.


2. Common Attacks

Common Attacks: Learn brute force, SQL injection, XSS,

and privilege escalation.

Exploitation: Understand how attackers exploit

vulnerabilities.

Mitigation: Defensive measures like patching and strong

authentication.

TASK (CTF)
3. PickleRick

Simulated Attack: Perform initial access, lateral

movement, and persistence.

Post-Exploitation: Data exfiltration and credential

harvesting.

Tools: Use Mimikatz, PowerShell, and Meterpreter.


ETHICAL HACKING
PROJECT

1. Password Strength Checker


Create a Python program to evaluate password strength based on
length, uppercase/lowercase letters, numbers, and special
characters.
Provide feedback like "Weak," "Moderate," or "Strong."

2. Basic Port Scanner


Write a Python script to scan open ports on a given IP address
and port range.
Handle invalid inputs and display open ports.

3. File Encryption/Decryption Tool


Create a Python program to encrypt and decrypt text files using a
secret key with the cryptography library.
Include options to save the output as a new file.
HACK
SECURE

Congratulations!
🚀 Here’s a Glimpse of Your Future Achievement

Hack Secure, boosting your Experience


with
this impactful internship!

Lakshay Jain Aryan Thakur


CEO co-founder

You might also like