Cyber Security February Minor Project
Cyber Security February Minor Project
• Project Name:
Cyber Security February Minor Project
• Problem Statement:-
• Perform Foot printing on Microsoft Website and gather information about website by using
online Websites (Whois / netcraft / Shodan / dnsdumpster., etc.) as much as possible and write
report on gathered info along with screenshots
• Test the System Security by using PRORAT / Darkcommet (Anyone Tool) Trojan by hacking
virtual machine and try to take screenshots & Keystrokes along with change data in Desktop.
Write a report on vulnerability issue along with screenshots how you performed and suggest
the security patch to avoid these type of attacks
Hacker Machine : Windows 7 / Windows 10
Victim machine : Windows XP / Windows 7
• Use BVM Tool (Download from Internet) to create a virus and inject in to Virtual system and
perform destruction program as per your wish and write a document along with screenshots
and suggest the preventive measures to avoid this malware affect
Hacker Machine : Windows 7 / Windows 10
Victim machine : Windows XP / Windows 7
• Write a small batch program and save as .bat extension and execute in victim machine
(Windows 7 /Windows 10 / Windows XP)
• Perform SQL injection on by using Havij Tool(Download it from Internet) on
http://testphp.vulnweb.com Write a report along with screenshots and mention preventive
steps to avoid SQL injections
• Use Wireshark Tool(Download it from Internet) to sniff the data and try to get the username
and password of http://demo.testfire.net/
• Clone a Facebook page and try to perform Desktop Phishing in your local machine and capture
the credentials and write the document along with screenshots and suggest the solution to
avoid from phishing
• Try to Encrypt the Data in image file using quick stego tool (Download from Internet) and
command prompt also and show them how to decrypt also. Write a report advantages of
cryptography and steganography)
Note:
1. Write a Document with on each task along with screenshots and after attack
mention the solutions to avoid those attacks
2. Use Only Virtual Machines to perform the tasks
3. Don’t try these attacks on real-time environment, we won’t be responsible for
any misuse
4. Create a New lab with all the Operating system and practice on that
5. Refer Internet resources for solutions and complete the project within given
date.