Welcome to my cybersecurity internship journey. This repository serves as a professional record of my technical progress, lab configurations, and security analysis over a 60-day roadmap.
- Goal: Establish a secure, isolated virtualization lab.
- Key Tools: VirtualBox, Kali Linux, Metasploitable2, Wireshark.
- Deliverables: View Task 1 Folder
- Status: ✅ Completed
- Goal: Discovering services and vulnerabilities.
- Key Tools: Nmap (NSE), GVM (OpenVAS), Vulners DB, Netdiscover.
- Deliverables: View Task 2 Folder
- Status: ✅ Completed
- Goal: Identify and exploit web vulnerabilities in a controlled environment.
- Key Tools: Burp Suite, OWASP ZAP, DVWA, Nikto.
- Deliverables: View Task 3 Folder
- Status: ✅ Completed
- Goal: To apply all skills in a self-chosen capstone project and simulate an incident response.
- Key Tools: Metaslpoit, Tcpdump.
- Deliverables: View Task 5 Folder
- Status ✅ Completed
- Web Security: Exploiting SQL Injection (SQLi), Cross-Site Scripting (XSS), and CSRF vulnerabilities.
- Proxy Interception: Using Burp Suite to intercept, analyze, and modify live HTTP/HTTPS traffic.
- Vulnerability Mitigation: Implementing Prepared Statements, Output Encoding, and Anti-CSRF tokens.
- Vulnerability Research: Mapping service versions to CVEs (e.g., CVE-2011-2523) and analyzing CVSS severity scores.
- Infrastructure Auditing: Deployment, configuration, and troubleshooting of GVM/OpenVAS environments.
- Network Reconnaissance: Stealth SYN scanning, OS fingerprinting, and automated service discovery.
- Virtualization: Secure lab isolation using Host-Only networking for safe exploitation.
- Traffic Analysis: Packet inspection and ICMP filtering via Wireshark.
- Incident Response & Forensics: Live traffic analysis using netstat and tcpdump; identifying Indicators of Compromise (IoCs) in Linux logs.
- System Hardening: Implementing Host-based Firewalls (Netfilter/Iptables) and service-level remediation.
- Exploitation Frameworks: Advanced usage of Metasploit for Remote Code Execution (RCE) and post-exploitation.
- Network Security: Designing secure virtual architectures and analyzing data flow between Auditor and Target nodes.
- Automation: Developing Bash scripts for automated security remediation and system hardening.
- Documentation: Version control via GitHub and professional technical report writing.