โ
Complete a minimum of 2 tasks from the list below.
๐ Cybersecurity Tasks
Task 01
Install and Configure Wireshark
Problem Statement: Install Wireshark and capture network traffic on your local machine.
Steps to Complete
- Download Wireshark from Wireshark's official website.
- Install the application following the prompts.
- Open Wireshark and start capturing packets on your network interface.
Tools / Platforms
- Tool: Wireshark
- You can use any tool/platform or dataset.
How to Submit
- Record a 10โ15 second video showcasing the installation and packet capture.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 02
Use Nmap for Network Scanning
Problem Statement: Perform a basic network scan using Nmap to discover devices on your local network.
Steps to Complete
- Download and install Nmap from Nmap's official website.
- Open a command prompt or terminal.
- Run a scan on your local network (e.g.,
nmap 192.168.1.0/24).
Tools / Platforms
How to Submit
- Record a video demonstrating the scan results.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 03
Set Up a Virtual Machine for Testing
Problem Statement: Set up a virtual machine using VirtualBox or VMware to create a safe testing environment.
Steps to Complete
- Download and install VirtualBox or VMware.
- Create a new virtual machine and install a Linux distribution (e.g., Ubuntu).
- Ensure the VM is set up for internet access.
Tools / Platforms
- Tool: VirtualBox or VMware
- OS: Linux (e.g., Ubuntu)
How to Submit
- Record a video demonstrating the VM setup.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 04
Use Online Tools for Vulnerability Assessment
Problem Statement: Conduct a basic vulnerability assessment using an online tool.
Steps to Complete
- Visit Qualys SSL Labs or Detectify.
- Enter a public website URL to scan for vulnerabilities.
- Review the assessment report generated.
Tools / Platforms
- Tool: Online vulnerability assessment tools
How to Submit
- Record a video of the assessment process and results.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 05
Analyze Logs Using a Text Editor
Problem Statement: Analyze server log files using a text editor to identify potential security incidents.
Steps to Complete
- Obtain a sample server log file.
- Open in a text editor (e.g., Notepad++, Sublime Text).
- Search for indicators of compromise such as failed login attempts.
Tools / Platforms
- Tools: Notepad++, Sublime Text
How to Submit
- Record a video demonstrating your log analysis.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 06
Create a Basic Phishing Email Simulation
Problem Statement: Create a simulated phishing email to understand common attacker tactics.
Steps to Complete
- Research common phishing tactics (urgency, spoofed addresses).
- Draft an email mimicking a phishing attempt โ clearly marked as a simulation.
- Share with peers for discussion.
Tools / Platforms
- Tools: Gmail, Outlook or any email platform
How to Submit
- Record a video summarizing the email components and intent.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 07
Conduct a Risk Assessment
Problem Statement: Perform a basic risk assessment for a fictional organization.
Steps to Complete
- Identify potential risks (data breaches, malware attacks).
- Assess the likelihood and impact of each risk.
- Document your findings and recommendations.
Tools / Platforms
- Tools: Microsoft Word, Google Docs
How to Submit
- Record a video summarizing your risk assessment findings.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 08
Write a Python Script for Log Analysis
Problem Statement: Develop a Python script that analyzes log files for failed login attempts.
Steps to Complete
- Set up a Python environment.
- Write a script that reads a log file and counts failed login attempts.
- Output the results to the console.
Tools / Platforms
How to Submit
- Record a video demonstrating the script execution and output.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 09
Develop a Basic Incident Response Plan
Problem Statement: Create an incident response plan for a hypothetical cybersecurity incident.
Steps to Complete
- Outline steps for identifying, containing, and recovering from a cyber incident.
- Define roles and responsibilities during an incident.
- Document your response plan clearly.
Tools / Platforms
- Tools: Microsoft Word, Google Docs
How to Submit
- Record a video summarizing your incident response plan.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 10
Create a Cybersecurity Awareness Presentation
Problem Statement: Develop a presentation educating users about cybersecurity best practices.
Steps to Complete
- Research common cybersecurity threats and preventive measures.
- Create a PowerPoint or Google Slides presentation.
- Share with peers for feedback.
Tools / Platforms
- Tools: PowerPoint or Google Slides
How to Submit
- Record a video presenting your slides.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
๐ Digital Forensics Tasks
Task 11
Use FTK Imager to Create a Disk Image
Problem Statement: Create a forensic image of a USB drive using FTK Imager.
Steps to Complete
- Download and install FTK Imager from AccessData's official website.
- Insert the USB drive and open FTK Imager.
- Select the USB drive and create a disk image file.
Tools / Platforms
How to Submit
- Record a video demonstrating the imaging process.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 12
Analyze a Disk Image Using Autopsy
Problem Statement: Analyze the disk image created in Task 11 using Autopsy.
Steps to Complete
- Download and install Autopsy from its official website.
- Open Autopsy and create a new case.
- Import the disk image and analyze its contents.
Tools / Platforms
How to Submit
- Record a video summarizing your analysis and findings.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 13
Use Wireshark for Packet Analysis
Problem Statement: Capture and analyze network packets using Wireshark.
Steps to Complete
- Start capturing packets on your network interface using Wireshark.
- Filter for HTTP packets and examine the details.
- Document your findings regarding the traffic observed.
Tools / Platforms
How to Submit
- Record a video demonstrating your packet analysis.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 14
Use Volatility for Memory Analysis
Problem Statement: Analyze a memory dump using Volatility to identify suspicious processes.
Steps to Complete
- Download and install Volatility from its official GitHub repository.
- Obtain a memory dump (sample file available online).
- Use Volatility commands to analyze and identify processes.
Tools / Platforms
How to Submit
- Record a video demonstrating your memory analysis.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Task 15
Create a Forensic Report
Problem Statement: Draft a forensic report based on the analysis conducted in Task 12.
Steps to Complete
- Document your analysis findings from the disk image analysis.
- Include methods used and significant artifacts discovered.
- Structure the report professionally.
Tools / Platforms
- Tools: Microsoft Word, Google Docs
How to Submit
- Record a video summarizing your forensic report.
- Upload the video to LinkedIn or YouTube.
- Tag: Hackora & Mentor Hemanth Reddy
- Submit the video link in the submission form.
Conclusion
These tasks are designed to give you real-world experience in cybersecurity and digital forensics while exploring various platforms and tools.
Remember to tag the company and mentor in your submissions.
Good luck, and enjoy your internship journey! ๐
Submit Internship Task โ