Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/vishwas-chakilam/goldman-sachs-virtual-internship
Goldman Sachs Virtual Internship
https://github.com/vishwas-chakilam/goldman-sachs-virtual-internship
Last synced: 1 day ago
JSON representation
Goldman Sachs Virtual Internship
- Host: GitHub
- URL: https://github.com/vishwas-chakilam/goldman-sachs-virtual-internship
- Owner: Vishwas-Chakilam
- Created: 2024-08-19T10:34:01.000Z (3 months ago)
- Default Branch: Internship
- Last Pushed: 2024-08-19T12:17:26.000Z (3 months ago)
- Last Synced: 2024-08-24T08:37:45.188Z (3 months ago)
- Homepage:
- Size: 817 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Goldman-Sachs-Virtual-Internship
## Project Title
**Goldman Sachs Job Simulation Analysis**
## Description
This project is centered around the analysis of the Goldman Sachs Job Simulation program. The simulation is designed to mimic real-world scenarios that candidates may encounter when working at Goldman Sachs. The project involves cracking leaked passwords using the Hashcat tool, evaluating the current security practices, and providing recommendations for improved password protection. Additionally, the project includes feedback on the overall experience with the job simulation and suggestions for improvement.
## Features
1. **Password Cracking Analysis:**
- Utilized Hashcat to crack MD5 hashed passwords.
- Analyzed the security weaknesses of using MD5 without salting.
- Provided recommendations for stronger password security practices.2. **Feedback and Evaluation:**
- Offered detailed feedback on the Goldman Sachs Job Simulation program.
- Suggested improvements for the program to enhance participant experience and learning outcomes.## Requirements
- **Hashcat:** A password-cracking tool that utilizes GPUs to crack various hashing algorithms efficiently.
- **MD5:** An outdated hashing algorithm that was analyzed and evaluated within this project.## Setup Instructions
1. **Install Hashcat:**
- Visit the [Hashcat website](https://hashcat.net/hashcat/) to download and install the latest version.
- Follow the installation instructions based on your operating system.2. **Run the Simulation:**
- Use the provided MD5 hashed passwords in the analysis section.
- Run Hashcat with appropriate commands to crack the passwords and analyze the results.3. **Analysis:**
- Review the cracked passwords and compare them with the organization’s current password policies.
- Provide recommendations based on the findings.## Recommendations for Future Work
- **Security Enhancements:**
- Implement stronger hashing algorithms like SHA-256 or bcrypt.
- Introduce salting to protect against rainbow table attacks.
- Enforce more stringent password complexity requirements.- **Program Feedback:**
- Include detailed feedback for participants after each simulation task.
- Expand scenarios to cover more departments and roles within Goldman Sachs.## Contributing
This project is a simulated analysis and is not open for public contributions. However, suggestions for improving the simulation and analysis are welcome.
## Authors
- **Vishwas Chakilam** - Project analysis and documentation.
## Acknowledgments- Thanks to Goldman Sachs for providing the job simulation program.
- Special thanks to the creators of Hashcat for developing a powerful tool used in this analysis.---
This README file provides an overview of the project, setup instructions, key features, and recommendations for future work. It serves as a guide for anyone looking to understand or replicate the analysis performed within this project.