Internship Report KALAI
Internship Report KALAI
COLLEGE OF ENGINEERING
AND TECHNOLOGY
R.S.M. NAGAR, PUDUVOYAL - 601206
(AN AUTONOMOUS INSTITUTION)
Internship report
A report submitted in partial fulfilment of the requirements for the Award of Degree of
Bachelor of Engineering
In
By
KALAIYARASAN G 111622108063
COURSE: INTERNSHIP
OCTOBER 2024
1
R.M.K. COLLEGE OF ENGINEERING AND
TECHNOLOGY
R.S.M. NAGAR, PUDUVOYAL - 601206
(AN AUTONOMOUS INSTITUTION)
BONAFIDE CERTIFICATE
Acknowledgement
First I would like to thank Thiru.R.S.Munirathinam, our beloved Chairman
and Thiru.R.M.Kishore, our Vice Chairman, Dr.N.Suresh Kumar Principal,
Dr. K. Sivaram, Dean Academics and Dr. K. Ramar Dean Research for the
facilities provided to accomplish this internship.
It is with great pleasure and deep gratitude that I acknowledge the help and
guidance of everyone who contributed to my journey at KAASHIV INFOTECH.
KALAIYARASAN G
(111622108063)
iv
Vision
To excel and take the lead in Cyber Security education, profession and research globally with a
commitment to effectively address societal needs
Mission
✤ To inculcate the students in designing and developing various projects in different areas of
cybersecurity, by providing a distinguished and high-quality education.
PEO 2 : Apply the cutting-edge latest technology within a professional, legal and ethical frame
work and will operate effectively in a multidisciplinary stream.
PEO 3 : Practice continued, self-learning to keep their knowledge and skills up to date and
remain abreast of the latest developments in Cyber Security.
PSO 3 : To apply standard tools, practices and strategies in cyber security for successful career
and entrepreneurship.
v
TABLE OF CONTENTS
DESCRIPTION
Table of content vi
List of Figures vii
List of Table viii
List of Abbreviations ix
PAGE NO.
Chapter COMPANY PROFILE
1:
1.1 About the company 11
1.2 Organization structure 11
1.3 Services offered by the Company 12
1.4 Working process of the company 12
1.5 My Internship Department /Section 13
Chapter CONCLUSION
4:
4.1 Summary of Learning and Skills Acquired 27
4.2 Reflection on Personal Growth 28
4.3 Value of the Internship Experience 29
4.4 Future Goals and Applications 29
vi
LIST OF FIGURES
TITLE PAGE
igure No.
NUMBER
vii
LIST OF TABLES
viii
LIST OF ABBREVIATIONS
Abbreviati Full Form
n
PN Virtual Private Network
QL Structured Query Language
TTPS HyperText Transfer Protocol Secure
DS Intrusion Detection System
PS Intrusion Prevention System
SH Secure Shell
NS Domain Name System
HCP Dynamic Host Configuration Protocol
MAC Media Access Control
ix
x
CHAPTER 1
1.1 ABOUT THE COMPANY
Kaashiv InfoTech is redefining its philosophy and business values while maintaining
a strong belief in the synergy between people and technology, driven by a passionate
team. The company combines best practices and expertise from industry leaders to
provide specialized Knowledge Services across various sectors, enabling clients to
enhance their in-house competencies. Kaashiv InfoTech prioritizes building strategic
partnerships over merely providing solutions, focusing on quality and processes. This
approach has established a loyal client base, reinforcing the company's commitment
to delivering innovative solutions that yield real business benefits, encapsulating the
idea of "Knowledge Meets Business."
Kaashiv Infotech is structured with multiple tiers to support its operational and
administrative functions efficiently. Key divisions include:
11
1.3 SERVICES OFFERED BY THE COMPANY
12
1.5 MY INTERNSHIP DEPARTMENT / SECTION
Through this internship, I developed hands-on skills in both defensive and offensive
security, enhancing my capabilities in network protection, threat detection, and
vulnerability exploitation. This experience has greatly expanded my technical skill set
and prepared me for future challenges in cybersecurity.
13
CHAPTER 2
2.1 Overview of the Work
14
o Applications: Ideal for organizations, schools, or universities that need
high-speed connectivity within close proximity.
o Advantages: LANs offer high-speed data transfer, making them
effective for local resource sharing.
Wide Area Network (WAN):
o Scope: Connects geographically dispersed locations, spanning cities,
countries, or even continents.
o Applications: Used by organizations with multiple office locations
needing connectivity over long distances.
o Advantages & Drawbacks: WANs support extensive communication
but often come with higher latency and increased costs.
Key Takeaway: LAN and WAN each serve distinct networking needs; LANs are
high-speed for local use, while WANs offer extensive reach with some trade-offs.
Circuit Switching:
Figure 1
15
Dedicated Channel Capacity: Inefficient for bursty data traffic,
as the channel remains allocated even when no data is transmitted.
Initial Delay: Takes time to establish the initial connection path.
Packet Switching:
Figure 2
Key Takeaway: Circuit switching is ideal for continuous data flows, whereas packet
switching offers flexibility and efficiency for intermittent data.
Key Takeaway: The Virtual Circuit approach provides reliability, while the
Datagram approach allows flexibility, both useful in different networking scenarios.
17
Table 1
Key Takeaway: Circuit and Packet Switching methods each have unique strengths,
with packet switching being more efficient for modern, bursty data traffic, while
circuit switching remains useful for dedicated connections, like voice calls.
18
Website Analysis: Reviewed the company website to familiarize
with internal terminology, recent news, and active projects.
o Outcome: Created detailed attack scenarios based on gathered data,
making the planned SE attempts more convincing and tailored to
specific employees.
Figure 3
19
o Real-World Example: Recalled a 2016 incident where employees of a
tech firm received similar phishing emails from a fake internal address,
leading to a data breach.
Technique 2: Pretexting via Phone Calls
o Scenario: Called employees, impersonating a new hire seeking help
with network access and software policies.
o Goal: Collected information on internal systems and software usage.
o Outcome: Some employees disclosed software details and network login
hints.
o Example: A similar pretexting approach targeted a financial institution,
where attackers, posing as IT personnel, gathered internal login
information from employees.
20
Key Takeaway: The results emphasized that employees lacked awareness regarding
phishing and pretexting indicators and were susceptible to curiosity-driven attacks
like baiting.
Objective: The primary aim was to evaluate the target system’s ability to
withstand high traffic and malicious connection attempts associated with a
Denial of Service (DoS) attack. This assessment focused on identifying any
system vulnerabilities that would disrupt legitimate user access.
21
Tool Used: Selected the hammer tool (from GitHub, created by cyweb) for
this DoS simulation due to its simplicity and effectiveness in generating high
volumes of HTTP requests.
Scope: The DoS simulation aimed to mimic high-traffic scenarios to assess the
system’s resilience and help identify security measures for improvement.
Key Takeaway: Understanding the objectives and scope of DoS attacks is essential
for evaluating system performance under stress and ensuring preparedness for high-
traffic situations.
Key Takeaway: This methodology emphasizes how DoS attacks target network
availability and the importance of choosing appropriate tools to measure system
limits.
22
Figure 4
cd hammer
3. Run the Script:
Key Takeaway: This day focused on configuring the attack environment correctly,
which is critical for a successful DoS simulation and accurate results.
23
Figure 5
Mechanism of Operation:
o The hammer tool generates a large volume of HTTP requests to the
target server. By increasing the number of concurrent requests, it
consumes the server’s resources, slowing response times or causing the
server to crash.
o The tool operates at the HTTP layer, so no high-level privileges are
needed, making it accessible and practical for testing.
o Traffic Volume: The number of requests (threads) can be configured,
allowing the attack intensity to be customized.
Example: Discussed a real-world incident from October 2016, where a series
of DoS attacks on the Dyn DNS service disrupted major websites (e.g.,
Twitter, Reddit, GitHub) by overwhelming DNS resources.
Execution Steps:
Key Takeaway: This day highlighted the actual execution of a DoS attack,
emphasizing how an overload of requests affects server performance and availability.
Attack Results:
o Metrics:
Attack Duration: 15 minutes.
Request Rate: ~500 requests/second.
Target Status: Significant slowdown and eventual timeout.
System Logs: Recorded HTTP 503 errors, indicating service
unavailability.
Analysis of Attack Impact:
o Server Response Degradation: The server’s response slowed under the
load, showing the absence of rate-limiting measures.
o Resource Exhaustion: High memory and CPU usage impacted other
services on the server.
24
o Log Analysis: HTTP 503 errors signaled that the server was unable to
process legitimate user requests due to resource exhaustion.
Recommendations:
o Rate Limiting: Implement measures to limit the number of requests per
user, reducing the likelihood of resource overload.
o Traffic Filtering: Utilize a Web Application Firewall (WAF) to filter
and block suspicious traffic patterns.
o Load Balancing: Distribute incoming traffic across multiple servers,
allowing the system to handle high loads more effectively.
o Enhanced Monitoring: Deploy monitoring tools to detect and
automatically respond to unusual traffic spikes.
Conclusion: The DoS simulation revealed that the target system struggled to handle
excessive traffic, demonstrating its vulnerability to service disruptions. By
implementing the recommended measures, the organization can better protect itself
from DoS and Distributed DoS (DDoS) attacks, ensuring continuous availability and
resilience.
CHAPTER 3
3.1 DETAILS
During my internship at Kaashiv Infotech, I engaged in a series of cybersecurity-
focused modules designed to enhance my knowledge and practical skills. Each
module was structured to bridge theoretical concepts with real-world applications,
enabling me to gain hands-on experience in implementing security measures within
an organizational setting. The key modules I developed or contributed to are
described below:
25
o Overview of Cyber Threats: Explored a range of cyber threats,
including malware, phishing, ransomware, and insider threats, with a
focus on their impact on organizational security.
Type of
Intentions Common Tools/Techniques
Hacker
White Hat Security improvement, Penetration testing tools,
Hacker compliance ethical hacking
Black Hat Data theft, financial Malware, phishing attacks,
Hacker gain keyloggers
Gray Hat Vulnerability scanners,
Skill testing, curiosity
Hacker hacking scripts
Publicly available hacking
Script Kiddie Vandalism, reputation
tools
DDoS attacks, website
Hacktivist Political activism
defacements
Table 2
26
o Privacy Policies and Regulations: Examined company policies on data
privacy and discussed regulatory requirements, including GDPR and
CCPA compliance.
27
CHAPTER 4
My two-week internship with Kaashiv Infotech was an invaluable experience,
providing me with comprehensive insights into IT infrastructure, cybersecurity, and
practical IT management within a dynamic tech environment. The structured, hands-
on approach of this internship allowed me to engage with real-world IT challenges
and solutions, and to apply my theoretical knowledge in a practical, collaborative
setting. Through exposure to various aspects of cybersecurity, system administration,
and IT project management, I gained practical experience that significantly enhanced
my technical skills and prepared me for future roles in the technology field.
29
The knowledge and skills I acquired during my internship at Kaashiv Infotech have
motivated me to pursue further education and certifications in cybersecurity, network
management, and ethical hacking. I plan to apply these competencies in future
projects and roles, focusing on enhancing my expertise as an IT professional. This
experience has clarified my career aspirations, and I am dedicated to advancing my
proficiency in cybersecurity practices and IT infrastructure management to contribute
effectively to the field.
30