Ethical Hacking Virtual Internship Prasad (1) (1) Edit
Ethical Hacking Virtual Internship Prasad (1) (1) Edit
A Summer Internship report submitted in partial fulfilment of the requirements for the award of the
degree of
BACHELOR OF TECHNOLOGY
in
submitted by
CHOWDARY DURGA VARA PRASAD
(21B21A4657)
Mr. K PAPARAO
Assistant Professor
CYBER SECURITY
2024-2025
KAKINADA INSTITUTE OF ENGINEERING AND TECHNOLOGY
(Approved by AICTE & Affiliated to JNTUK & Accredited by NAAC)
Yanam Road, Korangi, Andhra Pradesh-533461.
DEPARTMENT OF CSE – CYBER SECURITY
CERTIFICATE
This is to certify that the report entitled “ETHICAL HACKING VIRTUAL INTERNSHIP”, that is
in partial fulfillment for the award of the Degree of Bachelor of Technology in Computer Science and
Engineering Cyber Security, Kakinada Institute of Engineering and Technology is a record of bona fide
External Examiner
Student’s Declaration
OF ENGINEERING AND TECHNOLOGY do hereby declare that I have completed the mandatory
internship from OCTOBER 2024 to DECEMBER 2024 in ETHICAL HACKING VIRTUAL INTERNSHIP
(Cohort-10 10 Weeks Internship) under the Faculty guidance of MR. K PAPARAO Btech, Department of
fulfilment of the requirement for the Degree of B. TECH (CSE- CS) in the Department of
Endorsements
Faculty Guide
Principal
ACKNOWLEDGEMENTS
It gives us an immense Pleasure to express a deep sense of gratitude to our supervisor
of his whole hearted and valuable guidance throughout the report. Without his sustained and
sincere effort, this report would not have taken this shape. He encouraged and helped us to
overcome various difficulties that we have faced at various stages of our report.
Professor for providing all the necessary facilities that led to the successful completion of our
report.
We would like to sincerely thank Mr. K PAPARAO, Assistant Professor & Head of
the Department of CSE – CYBER SECURITY, for providing all the necessary facilities that
We would like to take this opportunity to thank our beloved Principal Dr. Revathi
Duba for providing a great support to us in completing our project and for giving us the
Finally, we would like to thank all of our friends and family members for their
21B21A4657
TABLE OF CONTENTS
• ACKNOWLEDGEMENT.
• INTERNSHIP CERTIFICATE
• INTERNSHIP REPORT
o Scanning Networks
o Enumeration
o Vulnerability Analysis
o System Hacking
INTERNSHIP REPORT INTRODUCTION
⮚ VISION OF EDUSKILLS
Transforming the vision of ‘Skilled India’ and Education for To benefit
the education ecosystem by providing 360degree holistic solutions to
all the stakeholders.
⮚ MISSION OF EDUSKILLS
To positively impact 1 million beneficiaries by 2024.
Registered / Accredited By
EDUSKILLS ETHICAL HACKING VIRTUAL
INTERNSHIP INTRODUCTION
3. Scanning Networks
4.Enumeration
5. Vulnerability Analysis
6. System Hacking
STEPS TO DO ETHICAL HACKING VIRTUAL
INTERNSHIP
Step 1: Signing In
Learned About
2nd Oct 2024 Basics of ETHICAL
Introduction to ETHICAL HACKING HACKING.
Learned about
some types of
3rd Oct 2024 Types of Ethical Hacking ETHICAL
HACKING.
Purpose:
Safeguard sensitive information. Prevent
unauthorized access.
Ensure compliance with cybersecurity regulations.
Strengthen system reliability and resilience.
Day & Brief description of the daily activity Learning Outcome Person
Date In-Charge
Signature
Learned About
8th Oct 2024 Importance of Foot printing Importance of Foot
printing.
DNS Enumeration:
Email Harvesting:
Collecting email addresses from public sources. Tools:
Harvester, Email Extractor.
Third-party Services:
Using external services to gain insights about the target,
such as SSL certificates, public repositories, and leaked
databases.
6. Tools for Foot printing and Reconnaissance
Malte go: Visual mapping of relationships and
links. Shodan: Internet-connected device search
engine.
Nmap: Network scanning and host discovery.
Recon-ng: Framework for open-source
reconnaissance. FOCA: Metadata extraction from
public documents.
Google Dorking: Advanced search queries to find
sensitive information.
7. Ethical Considerations
Always obtain authorization before performing active
reconnaissance.
Use gathered data responsibly and for ethical purposes.
Ensure compliance with local and international
cybersecurity laws.
ACTIVITY LOG FOR THE 3rd WEEK
Learned About
th
14 Oct 2024 Introduction to Network Scanning Introduction to
Network Scanning
• Port Scanning
• OS Fingerprinting
Identifies the operating system running on a
host. Tools: Nmap, Xprobe.
• Vulnerability Scanning
Matches discovered software versions against known
vulnerabilities.
Tools: Nessus, QualysGuard.
• Zenmap:
• Masscan:
• Netcat:
7. Ethical Considerations
Day & Brief description of the daily activity Learning Outcome Person
Date In-Charge
Signature
Learned About
16th Aug 2024 Introduction to Enumeration Enumeration
1. What is Enumeration?
Enumeration is a process where attackers or ethical
hackers establish active connections with a system and
query it to retrieve more in-depth information. This
stage is often the starting point for exploiting
vulnerabilities identified during scanning.
2. Objectives of Enumeration
Identify network resources and shared files.
Retrieve usernames, group memberships, and machine
names.
Discover service banners and application details.
Gather details about operating systems, DNS records,
and email addresses.
Extract system configuration and routing tables.
3. Types of Enumeration
• Network Enumeration
• DNS Enumeration
Extracts DNS records like A, MX, NS, and TXT.
Identifies subdomains and misconfigurations.
e. SNMP Enumeration
Uses the Simple Network Management Protocol
(SNMP) to extract data from network devices.
SNMP Enumeration:
Extracts data such as network configuration and
routing tables.
Tools: SNMP walk, SolarWinds SNMP Enabler.
LDAP Enumeration:
Queries Lightweight Directory Access Protocol
(LDAP) services for user and group information.
Tools: ldapsearch, JXplorer.
DNS Enumeration:
Extracts DNS records and subdomains.
Tools: Dig, Fierce, DNSRecon.
SMTP Enumeration:
Identifies valid email addresses on mail servers.
Tools: Telnet, Netcat, Metasploit.
Windows Enumeration:
Gathers data about shares, users, and groups in
Windows environments.
Tools: PowerShell, PsExec, WMIC.
Linux/Unix Enumeration:
Retrieves system details like user accounts and
running processes.
Tools: Finger, Rwho, RPCinfo.
Learned About
22nd Aug 2024 Introduction to Vulnerability Analysis Vulnerability
Analysis
System, Application,
Human.
3. Types of Vulnerabilities
• a. Network Vulnerabilities
• Report Findings:
Document vulnerabilities, their impact, and suggested
mitigation strategies.
Learned About
27th Aug 2024 Introduction to System Hacking Introduction to
System Hacking
• Gaining Access:
• Maintaining Access:
• Clearing Tracks:
Methods:
Brute Force Attack: Tries every possible combination.
Dictionary Attack: Uses pre-defined wordlists.
Rainbow Table Attack: Matches hashed passwords to
precomputed hash values.
Tools: John the Ripper, Cain and Abel, Hash cat.
• b. Exploiting Vulnerabilities
Identifying and exploiting software or OS vulnerabilities.
Tools: Metasploit, Exploits in CVE databases.
• c. Privilege Escalation
Techniques:
Exploiting SUID files or unpatched vulnerabilities.
Bypassing UAC (User Account Control) in
Windows.
Tools: Privilege Escalation Exploitation Framework
(PEEF).
• d. Keylogging
• f. Backdoor Installation
Date of Evaluation:
1 Oral communication 1 2 3 4 5
2 Written communications 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
4 Interaction ability with community 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
11 Quality of work done 1 2 3 4 5
12 Time Management 1 2 3 4 5
13 Understanding the Community 1 2 3 4 5
14 Achievement of Desired Outcomes 1 2 3 4 5
15 OVERALL PERFORMANCE 1 2 3 4 5
Date of Evaluation
1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
4 Interaction ability with community 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
11 Quality of work done 1 2 3 4 5
12 Time Management 1 2 3 4 5
13 Understanding the Community 1 2 3 4 5
14 Achievement of Desired Outcomes 1 2 3 4 5
15 OVERALL PERFORMANCE 1 2 3 4 5
Maximum Marks
Sl. No Evaluation Criterion Marks Awarded
1. Activity Log 20
2. Community Service Project Implementation 30
3. Mini Project Work 25
4. Oral Presentation 25
GRAND TOTAL 100
Certified by
Date: Signature of the Head of the Department/Principal
Seal: