MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
affiliated to Pondicherry University
Approved by NBA and Accredited by NAAC with "A" Grade
(A Unit of Sri Manakula Vinayagar Group of Education Institutions)
Kallteerthalkuppam, Puducherry - 605107, Ph:0413-2643007, Fax:2643008
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
REPORT ON CYBER SECURITY INTERNSHIP
Submitted By:
SOWMIYA.R
III YR CSE – B
22TD0406
DAY 1: INTRODUCTION TO CYBERSECURITY AND
LINUX
Date: 17-01-2025
The first day of the workshop introduced participants to cybersecurity, its
significance, and career opportunities. The session covered key cyber threats,
fundamental Linux concepts, and essential security tools used in the field.
Key Topics Covered:
1. Introduction to Cybersecurity
Importance in protecting individuals, organizations, and governments
Role of ethical hacking and cybersecurity professionals
2. Common Cyber Threats & Attacks
Malware, phishing, ransomware, and DDoS attacks
Real-world cases and defensive strategies
3. Linux Fundamentals
Linux architecture, command-line basics, and file system navigation
User permissions and security best practices
4. Security Tools in Linux
Overview of Nmap, Wireshark, Metasploit for security analysis
Firewall configurations and log monitoring
5. Cybersecurity Career Pathways
Roles like penetration tester, security analyst, and incident responder
Key certifications (CEH, CISSP, OSCP) and learning resources
This session provided a strong foundation in cybersecurity and Linux, preparing
participants for advanced topics in the upcoming sessions.
DAY 2: BASICS OF HACKING TOOLS AND
TERMINOLOGIES
Date: 18-01-2025
The second day of the workshop focused on ethical hacking, providing participant
with insights into key cybersecurity terminologies and essential tools used in
penetration testing. The session combined theoretical explanations with practical
applications, helping attendees understand how these tools function in real-world
scenarios.
Key Topics Covered:
1. Ethical Hacking Principles
Understanding ethical hacking and its role in cybersecurity
Difference between ethical hackers, black-hat, and gray-hat hackers
Phases of penetration testing (reconnaissance, exploitation, reporting)
2. Common Cybersecurity Terminologies
Exploits, payloads, vulnerabilities, backdoors, brute force attacks
Importance of reconnaissance and social engineering in cybersecurity
3. Introduction to Ethical Hacking Tools
Metasploit – Exploit framework for penetration testing
Nmap – Network scanning and vulnerability detection
Aircrack-ng – Wireless security auditing and cracking tools
4. Legal and Ethical Aspects of Cybersecurity
Cybersecurity laws and regulations governing ethical hacking
Responsible disclosure of vulnerabilities and ethical considerations
Importance of obtaining proper authorization before penetration testing
This session equipped participants with foundational knowledge of ethical hacking,
setting the stage for hands-on practical demonstrations in upcoming sessions.
DAY 3: WIRESHARK – NETWORK ANALYSIS
Date: 20-01-2025
Day 3 of the workshop focused on Wireshark, a network protocol analyzer used to
capture and inspect network traffic in real-time. Participants learned how to use
Wireshark for diagnosing network issues, detecting malicious activities, and analyzing
security vulnerabilities.
Key Topics Covered:
1. Understanding Network Packets and Protocols
Basics of network protocols (TCP/IP, HTTP, DNS) and packet structure
2. Capturing Live Network Traffic
Setting up Wireshark to capture and filter network traffic
3. Analyzing Data for Security Vulnerabilities
Identifying suspicious traffic patterns and potential security risks
4. Identifying Cyber Threats Using Packet Analysis
Recognizing cyberattacks like DoS, MITM, and phishing
This session provided practical skills for analyzing network traffic and identifying
threats, helping participants sharpen their cybersecurity expertise.
DAY 4: ZPHISHER – PHISHING TOOLKIT
Date: 21-01-2025
Day 4 introduced Zphisher, an open-source phishing tool used for ethical hacking
And security awareness training. Participants learned how phishing attacks work
and how to set up simulations for penetration testing.
Key Topics Covered:
1. Understanding Phishing Attacks
How attackers use phishing to steal credentials and spread malware
2. Setting Up Phishing Campaigns with Zphisher
Automating phishing simulations and generating fake login pages
3. Capturing Credentials Using Phishing Pages
Monitoring and analyzing data collected through phishing simulations
4. Mitigating and Preventing Phishing Attacks
Security best practices, user awareness training, and detection techniques
This session helped participants understand phishing tactics, their risks, and how to
implement effective countermeasures.
Zphisher Demonstration:
DAY 5: STORM BREAKER – SOCIAL
ENGINEERING TOOL
Date: 22-01-2025
The fifth day of the workshop introduced Storm Breaker, a powerful social
engineering tool used for ethical hacking and security awareness training. Participants
explored how attackers exploit human behavior to gather sensitive information, such
as IP addresses, geolocation, and device details, through deceptive techniques. The
session emphasized both offensive and defensive aspects of social engineering in
cybersecurity.
Key Topics Covered:
1. How Social Engineering Attacks Work
Exploiting human psychology to manipulate victims into revealing sensitive
data
Common attack methods: phishing, baiting, pretexting, and impersonation
2. Features of Storm Breaker
Generating fake links to extract location and device details
Capturing user information through social engineering tactics
3. Using Social Engineering for Ethical Hacking
Simulating real-world attacks for security assessments
Understanding how attackers exploit trust and social interactions
4. Defensive Measures Against Social Engineering
Recognizing social engineering attempts and identifying red flags
Implementing security awareness training and multi-factor authentication
Best practices for protecting sensitive information online
This session provided participants with a comprehensive understanding of social
engineering attacks, their risks, and effective countermeasures to strengthen cybersecurity
awareness.
Storm Breaker Uses:
DAY 6: LOCATION HACKING & WORKSHOP
SUMMARY
Date: 23-01-2025
The final day of the workshop focused on location hacking techniques,
demonstrating how geolocation data can be accessed, manipulated, and protected.
Using open-source GitHub repositories, participants explored real-world methods
attackers use to track locations and the preventive measures to counter unauthorized
tracking. The session emphasized ethical considerations and responsible usage of
such tools in cybersecurity.
Key Topics Covered:
1. Understanding Location Tracking and GPS Spoofing
How IP tracking is used to determine user geolocation
Methods of manipulating GPS data using spoofing techniques
Real-world applications and risks of location hacking
2. Demonstration of Real-Time Location Tracking
Exploring open-source tools for extracting geolocation data
How attackers leverage tracking methods for surveillance and fraud
Case studies on real-time location tracking and its implications
3. Ethical Implications of Location Hacking
Legal and ethical boundaries in geolocation tracking
The responsible use of tracking tools for security assessments
Consequences of unauthorized location access and misuse
4. Preventive Measures Against Unauthorized Tracking
Techniques to protect personal location data from being exploited
Using VPNs, disabling location services, and restricting app permissions
Implementing security best practices to enhance privacy protection
The workshop concluded with a final Q&A session, summarizing key insights
from all sessions and reinforcing the importance of ethical cybersecurity practices
in preventing location-based attacks.
Location Hacking Demonstration using Storm
Breaker:
CONCLUSION
The workshop successfully provided participants with a comprehensive
understanding of cybersecurity, equipping them with essential knowledge
and practical skills for ethical hacking and defense. Key takeaways include:
Gaining a strong foundation in cybersecurity principles and techniques
Learning to analyze network traffic using tools like Wireshark for
security assessments
Understanding phishing attacks through practical simulations with Zphisher
Exploring social engineering techniques using Storm Breaker to recognize
and counter human-based attacks
Identifying and preventing geolocation tracking threats through ethical
location hacking
Applying ethical hacking tools to simulate real-world attacks and test
defenses
Recognizing the legal and ethical implications of hacking techniques in
cybersecurity
Enhancing security awareness and implementing defense strategies for
personal and organizational protection
Studying real-world case studies on cybersecurity threats and vulnerabilities
Understanding cybersecurity as a career pathway, with insights into industry
demands and opportunities for growth
This workshop has laid the groundwork for participants to pursue careers in cybersecurity,
empowering them with both technical expertise and ethical awareness to combat evolving
threats in the digital world.