E Commerce Website of Genviss
E Commerce Website of Genviss
A INTERNSHIP REPORT
Submitted by
Aryan Banawadi
210120107504
BACHELOR OF ENGINEERING
In
Computer Engineering Department
Gandhinagar Institute of Technology
Gandhinagar
Genviss” has been carried out by Aryan Banawadi (210120107504) under my guidance in
partial fulfilment for the degree of Bachelor of Engineering in Computer Engineering, 8th
during the academic year 2023-2024 and his/her work is satisfactory. This student has
successfully completed all the activity under my guidance related to Project/Internship for 8th
semester.
I
Project Id: - 508544
II
Project Id: - 508544
Acknowledgement
I have taken efforts in this Internship/Project. However, it would not have been possible
without the kind support and help of many individuals and organizations. I would like to extend
my sincere thanks to all of them.
I am highly indebted to Ms. Niral Jadav (Internal Guide) & Mr. Amit Parmar (External
Guide) for their guidance and constant supervision as well as for providing necessary
information regarding the Internship. I take this opportunity to thank all my friends and
colleagues who started me out on the topic and provided extremely useful review feedback and
for their all-time support and help in each and every aspect of the course of my project
preparation. I am grateful to my college Gandhinagar Institute of Technology, for providing
me all required resources and good working environment.
I would like to express my gratitude towards Head of Department, Dr. Madhuri Chopade
for her kind co-operation and encouragement which help me in this Internship.
Thank You
Aryan Banawadi
III
Project Id: - 508544
IV
Project Id: - 508544
DECLARATION
We hereby declare that the Internship report submitted along with the Internship entitled E-
Commerce Website of Genviss submitted in partial fulfillment for the degree of Bachelor of
Engineering in Computer Engineering to Gujarat Technological University, Ahmedabad, is a
bonafide record of original project work carried out by me at Weborion Innovation Pvt Ltd under
the supervision of Mr. Amit Parmar(External) / Ms. Niral Jadav (Internal) and that no part of
this report has been directly copied from any students’ reports or taken from any other source,
without providing due reference.
V
Project Id: - 508544
Internship Content
Title Page I
Certificates(College) II
Certificates(Company) III
Acknowledgement IV
Declaration V
Content VI
1 Introduction 1
2 Introduction to Internship 2
3 Internship Implementation 7
4 Design 11
VI
Project Id: - 508544
5 Testing 17
6 Outcomes 20
VII
Project Id: - 508544
VIII
Project Id: - 508544
Chapter 1 Introduction
• We are proud of the role we have played in the success of many brands, businesses,
and corporations. Our clients’ satisfaction is a testament to the quality of service we
provide, and it reflects our dedication to excellence.
3. Empowering Clients: Empower clients with the knowledge and tools necessary
to understand, manage, and respond to evolving cybersecurity threats effectively.
4. Building Trust: Establish and maintain trust with clients by providing reliable,
transparent, and tailored cybersecurity solutions aligned with their business
objectives.
• Web OrionTM Innovation Pvt Ltd– Trusted brand since 2012 for Cyber Security
Services.
• We assist firms in protecting their websites, networks, and mobile apps by performing
extensive penetration testing.
• Our team is OSCP, CISSP, MILE2 CPTE, CEH, and APISEC certified, so all security
tests are performed in accordance with OWASP and CREST standards.
1
Project Id: - 508544
• Our team of experts will meticulously examine your web applications, APIs, apps,
and cloud environments to identify and prioritize potential security weaknesses. This
cybersecurity assessment project from Weborion offers a powerful solution to bolster
your organization's defenses.
• The system provides a basic website vulnerability scanner which scans the website
from the given domain or Ip and then does a basic vulnerability assessment and
provides a report which indicates the details about vulnerability and give grade to the
website according to severity.
2
Project Id: - 508544
Cloud Platform (GCP). We assess the security configurations, access controls, data
protection measures, and compliance with industry-specific regulations and standards.
Our testing methodologies include vulnerability scanning, penetration testing, and
configuration reviews to identify potential weaknesses and provide recommendations for
hardening cloud environments.
• Our testing services are tailored to meet the unique requirements of each client, taking
into account their specific industry, regulatory landscape, and risk profile. We follow
industry best practices and leverage cutting-edge tools and methodologies to ensure
comprehensive and accurate assessments.
• Throughout the engagement, our team of highly skilled and certified security
professionals works closely with clients, providing regular updates, detailed reports,
and actionable recommendations. We prioritize identified vulnerabilities based on
their severity and potential impact, enabling clients to make informed decisions and
implement effective remediation strategies.
• By partnering with our cybersecurity consultancy, clients can gain confidence in the
security of their web applications, mobile apps, cloud environments, and APIs,
ultimately protecting their critical assets, data, and reputation from cyber threats.
Technical Review:
3
Project Id: - 508544
3. Cloud Security:
- Cloud Service Provider-specific security best practices (e.g., AWS, Azure, GCP)
4. API Security:
5. General Cybersecurity:
6. Vulnerability Management:
4
Project Id: - 508544
Literature Review:
- Cybersecurity blogs and newsletters from trusted sources (e.g., SANS, OWASP,
NIST)
5
Project Id: - 508544
Our team of cybersecurity professionals continuously monitors these resources, staying up-
to-date with the latest developments, emerging threats, and best practices in the field. We
incorporate this knowledge into our testing methodologies, tools, and techniques to provide
our clients with the most comprehensive and effective cybersecurity solutions.
By conducting thorough technical and literature reviews, we ensure that our services align
with industry standards, leverage cutting-edge technologies, and address the most relevant
cybersecurity challenges faced by our clients.
The entire internship was planned by the company. On the first day, they gave a basic
introduction
to the company and guidelines about procedures followed in the company. After that, we
were
allocated our desks. With each phase of training, they communicated goals and learning
objectives.
An expert trainer was assigned in each phase for our task review.
6
Project Id: - 508544
Week: 2
1. In Last one week we have researched on various cyber–Security Related Topics to get
familiar with this field.
2. we have researched and created daily blogs & post accordingly as on given task for daily
task's
3. we have created white paper & Case Study accordingly for on trending or an attack which
is done on it.
4. we have learned various bug Bounty topics & performed online Labs
Week: 3
1. In Last one week we have done white paper on "key challenges of big data in enhancing
cyber-Security"
2. we have done group discussion on "IoT Security" we have done the case study on topic of
enhancing cybersecurity in web 3
3. And as per client Requirements we have been working developing website for using only
HTML & CSS only.
Week: 4
1. In Last one week we have done group discussion on for topic for "Integrating AI in Cyber
Security".
2. we have been working on developing site and we have been using various hyper-link and
header- footer on website to Redirect properly & the user view is better for resolution and
Compatible on all devices.
3. we have done Case Study on "Dark web"
4. we have Created various Blogs & Social media post as according to task for our research
on Cyber security
Week: 5
1. we have done developing of website on HTML & CSS using various div, wrapper class
and various another element on to it
2. we have deleted various script accordingly in website given by client to add by adding
plugins, on jQuery and main java Script into it.
3. we have added images according as given by client.
4. we have learned various Bug Bounty topics like URL Redirection, HTML Injection,
various SQL Injection Bug Bounty topics, Parameter Tampering, Like File Inclusion
Injection, Command Injection.
7
Project Id: - 508544
Week: 6
1. In week 6 we have done the group discussion on particular given topic
2. we have learned about many new elements and tags of HTML and CSS weed on our given
client project of jQuery.
3. we have even learned about many new topics of cyber-Security
Week: 7
1. We have worked upon same project of Genviss website and now we have to add up more
Content and images as given by our guide and client
2. we have used HTML & CSS in Genviss.
3. we have and Images new blogs and social media post and other purposes self- development
Week: 8
we have learned about many new topics of Cyber Security like:
we have done blogs of min. 2000 words and social medias post as on daily purpose work.
Week: 9
1. we get to know about new topics on Cyber Security and worked upon the Genviss website.
2. we get to know about how on Government Organization works for a Cyber Crime and
How do they help an Individual
Week; 10
1. We made some changes on Genviss website for the week and get to know from client
about those changes made on the website in it.
2. We get to know about End point protection technology.
3. And E-mail Security privacy and Anonymity.
Week: 11
1. Now by doing the final changes on website we have finalized the site and sent the same to
client by getting approval from external guide for the same.
2. We get to know about Group Discussion on any topic upskilling of one-self from anytime.
Week: 12
1. We get to know about Blogging on any kind of topic, group discussion as per company we
have to build our portfolio and present oneself to them as per their requirement.
2. Creating each Resume giving interview in such a way to give knowledge towards as per
requirement and as per our knowledge towards one or that domain into it.
8
Project Id: - 508544
9
Project Id: - 508544
10
Project Id: - 508544
Chapter 4 Design
Logical Design: The most creative and challenging phase of the system life cycle is
system design. The term design describes a final system and the process by which it is
developed. It refers to the technical specifications that will be applied in implementing the
proposed system. It also includes the construction of program and designing of output,
input, code, database and process of the system
11
Project Id: - 508544
1. User:
o Username
o Email
o Password
2. Vulnerabilities:
o Id
o Name
o Description
o Solution
12
Project Id: - 508544
o Priority
o Priority Num
3. Tests:
o Id
o Status
o numUrlsFound
o Type
o Num_requests_send
o Start_timestamp
o Finish_timestamp
o Scan_finished
o Url
o Username
o Urls_found
4. Test_results:
o Test_id
o Type
o Method
o Url
o Attack_str
13
Project Id: - 508544
1. Client/Organization
- Accounts and contacts
- Client environments and assets
- Requirements and test scopes
2. Project
- Test plan and scope definition
- Scheduling and consultant allocation
- Tools and configurations used
3. Finding
- Vulnerability details and root cause
- Severity, scoring, and prioritization
- Code samples and reproduce steps
- Impacted components and attack flow
- Remediation guidance and retest status
4. Asset/Component
- Application metadata and configurations
- Component inventory across web/mobile/APIs/cloud
- Data flows, trust boundaries, user roles
5. Evidence
- Screenshots and screen recordings
- Traffic captures and proxy logs
- Code snippets and analysis artifacts
6. Testing Tools and Plugins
- Vuln scanner plugins and rules
- Test script templates and workflows
- Scan configurations and policies
7. Reporting
- Finding management workflow
- Report templates and structure
- Metrics and risk scoring calculations
14
Project Id: - 508544
15
Project Id: - 508544
16
Project Id: - 508544
Chapter 5 Testing
Single User:
● Definition:
● The system supports one user at a time, typically suitable for personal or small-scale
events.
● Implications:
● Simplified data management and reduced complexity.
● Limited concurrency control requirements.
● Suitable for standalone, single-administrator scenarios.
Multiuser:
● Definition:
● The system accommodates multiple users simultaneously, essential for larger events
with multiple participants, organizers, and administrators.
● Implications:
● Requires robust concurrency control and transaction management to maintain data
integrity and consistency.
● Enables collaborative features and real-time interactions among users.
● Supports scalable growth and increased user engagement.
17
Project Id: - 508544
1. Process Specification:
● Planning
● Testing
● Report Generation
● Rechecking
● Disclosing Vulnerabilities
18
Project Id: - 508544
19
Project Id: - 508544
Chapter 6 Outcomes
20
Project Id: - 508544
21
Project Id: - 508544
22
Project Id: - 508544
23
Project Id: - 508544
24
Project Id: - 508544
Fig. 6.12 Details of Website putting as per client requirements and given content
25
Project Id: - 508544
27
Project Id: - 508544
28
Project Id: - 508544
7.1 Conclusion
In conclusion, the 13-week internship has been a transformative journey of learning and growth.
Through hands-on experience, collaboration with peers, and guidance from mentors, I have
honed my skills in Cyber Security & Penetration Testing and gained valuable insights into the
industry.
I am grateful for the opportunities to work on real-world projects, overcome challenges, and
receive constructive feedback that has allowed me to continuously improve. This internship has
not only expanded my technical proficiency but also enhanced my communication, problem-
solving, and time management abilities.
As I reflect on this experience, I am filled with confidence and excitement for the future,
knowing that the knowledge and skills acquired during this internship will serve as a solid
foundation for my career in Cyber Security & Penetration Testing.
Through our thorough website scanning solutions, we've become a trusted partner in securing the
online presence of organizations across industries. Our team's deep expertise, advanced
methodologies, and commitment to delivering tailored cybersecurity strategies have allowed
clients to operate with confidence, knowing their web assets are protected from ever-evolving
cyber threats.
As we look ahead, our dedication to continuous improvement and innovation will ensure we
remain at the forefront of this critical domain.
29
Project Id: - 508544
While website security remains our core strength, we are actively exploring opportunities to
broaden our service offerings. As businesses increasingly embrace cloud computing and mobile
technologies, we recognize the critical need for comprehensive cybersecurity solutions that
address these evolving landscapes. Our future roadmap includes developing specialized expertise
in cloud security, mobile application security testing, and securing Internet of Things (IoT)
deployments. By expanding our capabilities, we aim to provide our clients with a holistic
approach to cybersecurity, safeguarding their entire digital ecosystem.
30
Project Id: - 508544
Chapter 8 References
8.1 Bibliography
1. Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
2. Black Hat Python, 2nd Edition: Python Programming for Hackers and Pen testers
3. RTFM: Red Team Field Manual v2
● Websites:
1. https://techapprise.com/cybersecurity/hacking-learning-websites/
2. Hack a Day
3. https://www.programmingoverloaded.com/best-free-websites-to-learn-ethical-
hacking/
4. Hacking Loops
5. HackInTheBox
6. 13 Best Ethical Hacking Courses Online in 2024 [Free + Paid] (hackr.io)
31