#1 Penetration Testing Internship Report
#1 Penetration Testing Internship Report
#1 Penetration Testing Internship Report
ON
“Penetration Testing”
BACHELOR OF ENGINEERING
in
INFORMATION TECHNOLOGY
SUBMITTED BY
Nitin Santosh Gavhane
Exam No.: T190658520
DEPARTMENT OF IT ENGINEERING
KJEI’S TRINITY COLLEGE OF ENGINEERING AND RESEARCH
KONDHAWA SASWAD ROAD, PUNE 411048
SAVITRIBAI PHULE PUNE UNIVERSITY
2021-2022
Table of Content:
I do herby declare that the work presented in this report has been carried out by
me and has not been previously submitted to any other university/college/orga-
nization for other academic qualification/degree/certificate. The work I have
presented does not breach any copyright and no portion of this report is copied
from any work done earlier or otherwise.
Objective:
With an internship you have the opportunity to excel and possibly land
a jobwith the company. Internships give a taste of what a profession
is like, help build a resume and let us meet people who can help you
in your career.
Motivation:
Explore Phase:
Reporting Phase:
Find a bug or vulnerability, you must file a report to disclose your findings.
Generally, you have to explain where the bug was found, who it affects, how
to reproduce it, the parameters it affects, and provide Proof-of-Concept
supporting information. You can upload any files or logs as supporting
evidence.
This not only helps quickly reproduce the issue but moves your
submission through the review process faster, with no delays due to
missing information.!
Bug Reports –
Bug Report - config file disclosure
Access any person Location, Device, IP address/Provider Info
Vai using Clickjacking and Reflected xss attack ( Subdomain:
intercom-vigilante.agicap.com )
more
Bug Bounty Platforms:
1. Bugcrowd:
https://www.bugcrowd.com/
2. Hackerone:
https://www.hackerone.com/
3. Synack:
https://www.synack.com/
5. Cobalt:
https://cobalt.io/
6. Zerocopter:
https://zerocopter.com/
7. Hackenproof:
https://hackenproof.com/
8. BountyFactory:
https://bountyfactory.io
10. AntiHack:
https://www.antihack.me/
We have a target then how to start ?
If you have chosen your target, then you should start finding the
subdomain of the target.
or we can start with the IP blocks of the targets which we can get
from the ASN (some of the websites are mentioned in below)
Subfinder
Amass
Sublist3r
Aquatone
Knockpy
We can also find sub-domain via online recon tools. (sites are given
below)
Goto this link and learn about some basics to advance concepts of Subdomain takeover
vulnerability.
https://github.com/EdOverflow/can-i-take-over-xyz
https://whois.arin.net/ui/query.do
Parsing JS is very useful to find the directories which is used by the target. we can
use these type of tools instead of brute-forcing the directory list on the target
Note: Brute-Forcing of directory also good thing to do. Always use the multiple
techniques to find the directory from the targets(I found Hotsar Aws Credentials
with Directory Buster & Burp Intruder)
linkfinder
DIRsearch
Dirb
Content Discovery: “ Gobuster”
Credential Bruteforce: “BrutesprayBrutespray”
These tools are having the ability to brute-force the different type of protocols like
http, ssh,smtp, etc
Technology Identification and Vulnerability findings:
WPScan
Cmsmap
Before start testing I recommend this book for bug hunter bcoz it
help a lot to understand & Exploit the bug!
The testing is based on our opinion. some of them start with the xss
and other vulnerabilities which we can easily found from the target.
Still you are stuck with the testing for a bug means you can start
reading the following books which always helpful for Bug hunter or
Application Penetration Tester.
for our Mobile hacking friends:
I hope these books are very helpful for how to test for a bugs
2. inurl:index.php?id=
References:
https://github.com/ngalongc/bug-bounty-reference
https://pentester.land/list-of-bug-bounty-writeups.html
https://tikam02.github.io/Bug-Bounty-Resources/