Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
30 views12 pages

Sowmiya Cybersecurity Report

The report outlines a cybersecurity internship workshop conducted at Manakula Vinayagar Institute of Technology, covering key topics such as ethical hacking, network analysis, phishing, social engineering, and location hacking over six days. Participants gained practical skills using tools like Wireshark, Zphisher, and Storm Breaker, while also understanding the legal and ethical implications of cybersecurity practices. The workshop aimed to equip attendees with essential knowledge and skills for pursuing careers in cybersecurity.

Uploaded by

nsaranya363
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views12 pages

Sowmiya Cybersecurity Report

The report outlines a cybersecurity internship workshop conducted at Manakula Vinayagar Institute of Technology, covering key topics such as ethical hacking, network analysis, phishing, social engineering, and location hacking over six days. Participants gained practical skills using tools like Wireshark, Zphisher, and Storm Breaker, while also understanding the legal and ethical implications of cybersecurity practices. The workshop aimed to equip attendees with essential knowledge and skills for pursuing careers in cybersecurity.

Uploaded by

nsaranya363
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY

affiliated to Pondicherry University


Approved by NBA and Accredited by NAAC with "A" Grade
(A Unit of Sri Manakula Vinayagar Group of Education Institutions)
Kallteerthalkuppam, Puducherry - 605107, Ph:0413-2643007, Fax:2643008

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

REPORT ON CYBER SECURITY INTERNSHIP

Submitted By:
SOWMIYA.R
III YR CSE – B
22TD0406
DAY 1: INTRODUCTION TO CYBERSECURITY AND
LINUX
Date: 17-01-2025
The first day of the workshop introduced participants to cybersecurity, its
significance, and career opportunities. The session covered key cyber threats,
fundamental Linux concepts, and essential security tools used in the field.
Key Topics Covered:
1. Introduction to Cybersecurity
 Importance in protecting individuals, organizations, and governments
 Role of ethical hacking and cybersecurity professionals
2. Common Cyber Threats & Attacks
 Malware, phishing, ransomware, and DDoS attacks
 Real-world cases and defensive strategies
3. Linux Fundamentals
 Linux architecture, command-line basics, and file system navigation
 User permissions and security best practices
4. Security Tools in Linux
 Overview of Nmap, Wireshark, Metasploit for security analysis
 Firewall configurations and log monitoring
5. Cybersecurity Career Pathways
 Roles like penetration tester, security analyst, and incident responder
 Key certifications (CEH, CISSP, OSCP) and learning resources

This session provided a strong foundation in cybersecurity and Linux, preparing


participants for advanced topics in the upcoming sessions.
DAY 2: BASICS OF HACKING TOOLS AND
TERMINOLOGIES
Date: 18-01-2025
The second day of the workshop focused on ethical hacking, providing participant
with insights into key cybersecurity terminologies and essential tools used in
penetration testing. The session combined theoretical explanations with practical
applications, helping attendees understand how these tools function in real-world
scenarios.
Key Topics Covered:
1. Ethical Hacking Principles
 Understanding ethical hacking and its role in cybersecurity
 Difference between ethical hackers, black-hat, and gray-hat hackers
 Phases of penetration testing (reconnaissance, exploitation, reporting)
2. Common Cybersecurity Terminologies
 Exploits, payloads, vulnerabilities, backdoors, brute force attacks
 Importance of reconnaissance and social engineering in cybersecurity
3. Introduction to Ethical Hacking Tools
 Metasploit – Exploit framework for penetration testing
 Nmap – Network scanning and vulnerability detection
 Aircrack-ng – Wireless security auditing and cracking tools
4. Legal and Ethical Aspects of Cybersecurity
 Cybersecurity laws and regulations governing ethical hacking
 Responsible disclosure of vulnerabilities and ethical considerations
 Importance of obtaining proper authorization before penetration testing

This session equipped participants with foundational knowledge of ethical hacking,


setting the stage for hands-on practical demonstrations in upcoming sessions.
DAY 3: WIRESHARK – NETWORK ANALYSIS
Date: 20-01-2025
Day 3 of the workshop focused on Wireshark, a network protocol analyzer used to

capture and inspect network traffic in real-time. Participants learned how to use

Wireshark for diagnosing network issues, detecting malicious activities, and analyzing

security vulnerabilities.

Key Topics Covered:

1. Understanding Network Packets and Protocols


 Basics of network protocols (TCP/IP, HTTP, DNS) and packet structure

2. Capturing Live Network Traffic


 Setting up Wireshark to capture and filter network traffic

3. Analyzing Data for Security Vulnerabilities

 Identifying suspicious traffic patterns and potential security risks

4. Identifying Cyber Threats Using Packet Analysis


 Recognizing cyberattacks like DoS, MITM, and phishing

This session provided practical skills for analyzing network traffic and identifying
threats, helping participants sharpen their cybersecurity expertise.
DAY 4: ZPHISHER – PHISHING TOOLKIT
Date: 21-01-2025
Day 4 introduced Zphisher, an open-source phishing tool used for ethical hacking

And security awareness training. Participants learned how phishing attacks work

and how to set up simulations for penetration testing.

Key Topics Covered:

1. Understanding Phishing Attacks

 How attackers use phishing to steal credentials and spread malware

2. Setting Up Phishing Campaigns with Zphisher


 Automating phishing simulations and generating fake login pages

3. Capturing Credentials Using Phishing Pages


 Monitoring and analyzing data collected through phishing simulations

4. Mitigating and Preventing Phishing Attacks

 Security best practices, user awareness training, and detection techniques

This session helped participants understand phishing tactics, their risks, and how to
implement effective countermeasures.

Zphisher Demonstration:
DAY 5: STORM BREAKER – SOCIAL
ENGINEERING TOOL
Date: 22-01-2025
The fifth day of the workshop introduced Storm Breaker, a powerful social
engineering tool used for ethical hacking and security awareness training. Participants
explored how attackers exploit human behavior to gather sensitive information, such
as IP addresses, geolocation, and device details, through deceptive techniques. The
session emphasized both offensive and defensive aspects of social engineering in
cybersecurity.
Key Topics Covered:
1. How Social Engineering Attacks Work
 Exploiting human psychology to manipulate victims into revealing sensitive
data
 Common attack methods: phishing, baiting, pretexting, and impersonation
2. Features of Storm Breaker
 Generating fake links to extract location and device details
 Capturing user information through social engineering tactics
3. Using Social Engineering for Ethical Hacking
 Simulating real-world attacks for security assessments
 Understanding how attackers exploit trust and social interactions
4. Defensive Measures Against Social Engineering
 Recognizing social engineering attempts and identifying red flags
 Implementing security awareness training and multi-factor authentication
 Best practices for protecting sensitive information online

This session provided participants with a comprehensive understanding of social


engineering attacks, their risks, and effective countermeasures to strengthen cybersecurity
awareness.
Storm Breaker Uses:
DAY 6: LOCATION HACKING & WORKSHOP
SUMMARY
Date: 23-01-2025
The final day of the workshop focused on location hacking techniques,
demonstrating how geolocation data can be accessed, manipulated, and protected.
Using open-source GitHub repositories, participants explored real-world methods
attackers use to track locations and the preventive measures to counter unauthorized
tracking. The session emphasized ethical considerations and responsible usage of
such tools in cybersecurity.
Key Topics Covered:
1. Understanding Location Tracking and GPS Spoofing
 How IP tracking is used to determine user geolocation
 Methods of manipulating GPS data using spoofing techniques
 Real-world applications and risks of location hacking
2. Demonstration of Real-Time Location Tracking
 Exploring open-source tools for extracting geolocation data
 How attackers leverage tracking methods for surveillance and fraud
 Case studies on real-time location tracking and its implications
3. Ethical Implications of Location Hacking
 Legal and ethical boundaries in geolocation tracking
 The responsible use of tracking tools for security assessments
 Consequences of unauthorized location access and misuse
4. Preventive Measures Against Unauthorized Tracking
 Techniques to protect personal location data from being exploited
 Using VPNs, disabling location services, and restricting app permissions
 Implementing security best practices to enhance privacy protection

The workshop concluded with a final Q&A session, summarizing key insights
from all sessions and reinforcing the importance of ethical cybersecurity practices
in preventing location-based attacks.
Location Hacking Demonstration using Storm
Breaker:
CONCLUSION
The workshop successfully provided participants with a comprehensive
understanding of cybersecurity, equipping them with essential knowledge
and practical skills for ethical hacking and defense. Key takeaways include:

 Gaining a strong foundation in cybersecurity principles and techniques


 Learning to analyze network traffic using tools like Wireshark for
security assessments
 Understanding phishing attacks through practical simulations with Zphisher
 Exploring social engineering techniques using Storm Breaker to recognize
and counter human-based attacks
 Identifying and preventing geolocation tracking threats through ethical
location hacking
 Applying ethical hacking tools to simulate real-world attacks and test
defenses
 Recognizing the legal and ethical implications of hacking techniques in
cybersecurity
 Enhancing security awareness and implementing defense strategies for
personal and organizational protection
 Studying real-world case studies on cybersecurity threats and vulnerabilities
 Understanding cybersecurity as a career pathway, with insights into industry
demands and opportunities for growth

This workshop has laid the groundwork for participants to pursue careers in cybersecurity,
empowering them with both technical expertise and ethical awareness to combat evolving
threats in the digital world.

You might also like