Skip to content

8ORUZ7/infosec-internship

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

EN | CN

infosec-internship (summer-2025)

This repository documents the topics, modules, and hands-on activities covered during my infosec training, where I conducted and delivered discussions focused on the foundations of cybersecurity and penetration testing.


Overview

The internship focused on the core principles and practices of ethical hacking, structured into multiple stages from foundational knowledge to practical penetration testing. This included setting up labs, exploring attack vectors, understanding security tools, and analyzing real-world hacking techniques.

Stage 1: Core Concepts & Lab Setup

  • Module 1: Fundamentals of Ethical Hacking
  • Module 2: Pentest Lab Setup (Kali Linux, VirtualBox/VMware)
  • Module 3: Basic Networking & Protocols (TCP/IP, OSI Model)

Stage 2: Reconnaissance & Scanning

  • Module 4: Footprinting (OSINT, DNS, Email, Google Hacking)
  • Module 5: Network Scanning (Nmap, Zenmap, Netdiscover)
  • Module 6: Enumeration (SMB, FTP, Telnet, SMTP)

Stage 3: System Exploitation

  • Module 7: System Hacking with Metasploit
  • Module 8: Post Exploitation Techniques (Persistence, Credential Dumping)
  • Module 9: Malware Concepts and Threat Analysis

Stage 4: Web, Social, Mobile

  • Module 10: Web Hacking (OWASP, Burpsuite, SQLi, XSS)
  • Module 11: Social Engineering (Phishing, SET Toolkit)
  • Module 12: Mobile Hacking (APK Generation, SMS Spoofing, NetHunter)

Stage 5: Network Attacks

  • Module 13: Sniffing & Spoofing (MITM, ARP/DNS Poisoning)
  • Module 14: DoS & DDoS Attacks (Hping3, Golden-eye)
  • Module 15: Wireless Hacking (WPA2 Cracking, Evil Twin, Airgeddon)

Stage 6: Defensive Security

  • Module 16: IDS, Firewalls & Honeypots (Snort, Kfsensor)
  • Module 17: Cryptography & Steganography (AES, Hashing, ROT13, Steghide)

Hands-on Activities

  • Lab setup (Windows, Linux, VirtualBox, AWS)
  • Packet capture and analysis (Wireshark, Tshark)
  • Service-specific attacks (FTP, SSH, SMB, RDP, MySQL)
  • Brute-force attacks (Hydra, Medusa, CeWL)
  • Password cracking & keylogging
  • Network mapping, port scanning, vulnerability scanning (Nessus, Nmap)
  • Post-exploitation tasks (hashdump, privilege escalation, persistence)
  • Honeypot deployment and intrusion detection (Snort IDS)

About

discussion (to be migrated in @TAPEZONE128)

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published