0% found this document useful (0 votes)
97 views5 pages

Internship Tasklist For Blue Teaming

The document outlines the prerequisites and tasks for interns in the HACK SECURE internship program, focusing on blue teaming in cybersecurity. Interns must update their LinkedIn profiles, complete specified tasks, and obtain validation from mentors before submission. Key tasks include network security analysis, incident response playbook creation, and web application security practices.

Uploaded by

pranavasai006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views5 pages

Internship Tasklist For Blue Teaming

The document outlines the prerequisites and tasks for interns in the HACK SECURE internship program, focusing on blue teaming in cybersecurity. Interns must update their LinkedIn profiles, complete specified tasks, and obtain validation from mentors before submission. Key tasks include network security analysis, incident response playbook creation, and web application security practices.

Uploaded by

pranavasai006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

HACK

SECURE

INTERNSHIP TASKLIST
BLUE TEAMING

CLOUD NETWORK CYBER


SECURITY SECURITY SECURITY

2025
JANUARY
BATCH
Internship Pre-requisites before starting your
tasks:
HACK
SECURE

1. LinkedIn Profile Update: Ensure that your LinkedIn profile is


updated to reflect your technical skills, and update your
experience section to include "HACK SEC Cyber Security Intern."

2. LinkedIn Post: It's not mandatory to post the offer letter on


LinkedIn, but if you wish at the end of the internship, you can
post your offer letter and tag us.

3. Completion of Tasks: Complete the required tasks as


specified in this Task List.

4. Proof of Work: At HACK SECURE, we value Proof of Work


(POW). You need to get validated from your mentor before you
submit your respective tasks in the Task Submission Forms.

Note: Do not upload your Report in LinkedIn, this would allow


others to copy your work. If the team finds out that you have
posted your report in LinkedIn, your internship would be
terminated.

After completing all the above steps, proceed with your task
completion. Kindly note that all the details and reports you
submit will be thoroughly verified before you receive the
Certificate.
TASK LEVEL
INTERMIDIATE
1). Find all the ports that are open on the website
http://testphp.vulnweb.com/

2). Brute force the website http://testphp.vulnweb.com/ and find

the directories that are present in the website.

3). Make a login in the website http://testphp.vulnweb.com/ and

intercept the network traffic using Wireshark and find the

credentials that were transferred through the network.

1. IR Playbooks

Incident Response Phases: Identification, containment,

recovery, and lessons learned.

IR Tools: Log analysis, network forensics, and endpoint

monitoring.

Playbook Creation: Build customized incident response

playbooks.
2. Intro to Web Application Security

Vulnerabilities: SQL injection, XSS, and IDOR.

Best Practices: Secure coding, input validation, and

access control.

Web Monitoring: Use WAFs and IDS to detect attacks.

TASK (CTF)

3. PickleRick

Security Monitoring: Detect threats via logs and alerts.

Incident Investigation: Identify anomalies in activity.

Tools: Work with Sysmon, Splunk, and ELK for analysis.


HACK
SECURE

Congratulations!
🚀 Here’s a Glimpse of Your Future Achievement

Hack Secure, boosting your Experience


with
this impactful internship!

Lakshay Jain Aryan Thakur


CEO co-founder

You might also like