This repository documents the topics, modules, and hands-on activities covered during my infosec training
, where I conducted and delivered discussions focused on the foundations of cybersecurity and penetration testing.
The internship focused on the core principles and practices of ethical hacking, structured into multiple stages from foundational knowledge to practical penetration testing. This included setting up labs, exploring attack vectors, understanding security tools, and analyzing real-world hacking techniques.
- Module 1: Fundamentals of Ethical Hacking
- Module 2: Pentest Lab Setup (Kali Linux, VirtualBox/VMware)
- Module 3: Basic Networking & Protocols (TCP/IP, OSI Model)
- Module 4: Footprinting (OSINT, DNS, Email, Google Hacking)
- Module 5: Network Scanning (Nmap, Zenmap, Netdiscover)
- Module 6: Enumeration (SMB, FTP, Telnet, SMTP)
- Module 7: System Hacking with Metasploit
- Module 8: Post Exploitation Techniques (Persistence, Credential Dumping)
- Module 9: Malware Concepts and Threat Analysis
- Module 10: Web Hacking (OWASP, Burpsuite, SQLi, XSS)
- Module 11: Social Engineering (Phishing, SET Toolkit)
- Module 12: Mobile Hacking (APK Generation, SMS Spoofing, NetHunter)
- Module 13: Sniffing & Spoofing (MITM, ARP/DNS Poisoning)
- Module 14: DoS & DDoS Attacks (Hping3, Golden-eye)
- Module 15: Wireless Hacking (WPA2 Cracking, Evil Twin, Airgeddon)
- Module 16: IDS, Firewalls & Honeypots (Snort, Kfsensor)
- Module 17: Cryptography & Steganography (AES, Hashing, ROT13, Steghide)
- Lab setup (Windows, Linux, VirtualBox, AWS)
- Packet capture and analysis (Wireshark, Tshark)
- Service-specific attacks (FTP, SSH, SMB, RDP, MySQL)
- Brute-force attacks (Hydra, Medusa, CeWL)
- Password cracking & keylogging
- Network mapping, port scanning, vulnerability scanning (Nessus, Nmap)
- Post-exploitation tasks (hashdump, privilege escalation, persistence)
- Honeypot deployment and intrusion detection (Snort IDS)