Skip to content

yottajunaid/SECT_Internship_Project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🛡️ SECT Internship 🛡️

Thanks to Civora Nexus

📚 Project Timeline

Week Title Download Report
✅ Week 1 🔍 Reconnaissance & Surface Mapping View PDF 🔗
✅ Week 2 🛡️ Vulnerability Assessment & Proof of Concept View PDF 🔗
✅ Week 3 💥 Data Breach Analysis & OWASP Mapping View PDF 🔗

📁 Access the full project site: yottajunaid.github.io/SECT_Internship_Project


Week 1: Passive Reconnaissance & Threat Modeling

🎯 Project Objective

To simulate an attacker's reconnaissance phase using passive information gathering techniques — without interacting directly with the target and evaluate what assets are exposed to the public internet.

Target Website: http://tendermines.com


🔧 Reconnaissance Techniques Used

  • 🔍 WHOIS & DNS Lookups (via who.is and MXToolbox)
  • 🌐 BuiltWith Analysis (to identify tech stack and hosting infra)
  • 🕵️‍♂️ Google Dorking (to find exposed endpoints, documents, logins)
  • 📡 Subdomain Enumeration (via DNSDumpster, crt.sh, VirusTotal)
  • 🔐 SSL/TLS Analysis (or lack thereof)
  • 🎭 Website Social Engineering Audit
  • 👤 Social Media Reconnaissance (LinkedIn, GitHub, etc.)
  • 🌑 Dark Web Filtering (IntelX leak validation)

🕳️ Dark Web Leak Reference


📁 Included Files

  • Week_1/reconnaissance_sect.pdf – Full PDF report with:
    • Screenshots of tools
    • Threat modeling table
    • Risk assessment matrix
    • Recommendations

This project demonstrates the importance of passive reconnaissance in understanding an organization’s public exposure. Through ethical OSINT and threat modeling, we can simulate how attackers gather intelligence and propose defensive actions before real exploitation happens.


Week 2: Web Vulnerability Analysis

Target: http://tendermines.com

🧪 Key Activities:

  • XSS Testing: Injected common payloads in URL parameters, search bar, and contact form.
  • SQL Injection (Error-Based): Entered payloads like ' OR 'x'='x in login form.
  • SSL/TLS Verification: Site served over HTTP without HTTPS, HSTS, or secure cookies.
  • Email Security: Missing SPF, DKIM, and DMARC DNS records — vulnerable to email spoofing.
  • Info Disclosure: SQL error outputs revealed internal server paths and database structure.
  • Admin/Login Page Indexing: /login page publicly accessible and potentially indexed; lacked protections.
  • Security Headers: X-Frame-Options present, but CSP, HSTS, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy were missing.

✅ Risk Assessment – Summary Table:

# Issue Risk Level
1 SQL Injection (Error-Based) 🔴 High
2 Leaked Sensitive Info 🔴 High
3 Missing HTTPS/TLS 🔴 High
4 Missing Email Auth (SPF/DKIM/DMARC) 🔴 High
5 Admin Page Indexed 🟠 Medium
6 Missing Security Headers 🟠 Medium
7 No XSS Found ⚪ N/A

📁 Included Files

  • Week_2/vulnerabilityreport_sect – Full PDF report with:
    • Screenshots of tools
    • Threat modeling table
    • Risk assessment matrix
    • Recommendations

Week 3: A Real-World Breach Analysis + OWASP Mapping Report

Target: http://tendermines.com

🔍 Key Activities

  • IntelX Dark Web Intelligence – Discovered tendermines.com.sql database leak, first indexed Nov 1, 2023.
  • Incident Timeline Construction – Traced key events from reconnaissance, vulnerability findings to breach disclosure.
  • Technical Root Cause Analysis – Identified critical flaws: SQL Injection, missing HTTPS, exposed admin endpoints, verbose error disclosures, misconfigured DNS/email policies.
  • OWASP & CIA Impact Mapping – Mapped vulnerabilities to OWASP Top 10 categories and assessed impact across Confidentiality, Integrity, and Availability dimensions.
  • Threat Modeling (STRIDE) – Detailed threat vectors and attack flows including SQLi, spoofing, brute‑force, and data exfiltration.
  • Remediation Roadmap – Developed a prioritized strategy matrix covering secure coding, infrastructure hardening, email protections, monitoring, and policy enforcement.
  • Visual Architecture & Flow Diagrams – Included threat mapping, deployment pipeline, security architecture, and stakeholder impact visuals.

📁 Included Files

  • Week_3/breach_analysis_and_OWASP_mapping_sect.pdf – Full PDF report with:
    • Screenshots of tools
    • Technical Root Cause Analysis
    • Threat modeling table
    • Affected Stakeholders
    • CIA Triad Impact Mapping
    • OWASP Top 10 Mapping
    • Incident Timeline
    • Risk assessment matrix
    • Recommendations

✒️ Author

Junaid Quadri
SECT Cybersecurity Intern – July 2025


🔖 Tags

cybersecurity osint reconnaissance sect-internship darkweb social-engineering bugbounty tls dns-security