0% found this document useful (0 votes)
65 views

Cyber Security February Minor Project

The document outlines a minor cybersecurity project involving performing footprinting and reconnaissance on the Microsoft website, testing system security using hacking tools on virtual machines, creating and injecting a virus using BVM Tool, writing a batch program to execute on victim machines, performing SQL injection using Havij Tool, sniffing data using Wireshark, cloning a Facebook page for phishing, and encrypting/decrypting data in images and command prompt using quick stego tool. The student is instructed to write reports with screenshots for each task and suggested solutions, and only use virtual machines to avoid misuse.

Uploaded by

Shravan Kumar N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

Cyber Security February Minor Project

The document outlines a minor cybersecurity project involving performing footprinting and reconnaissance on the Microsoft website, testing system security using hacking tools on virtual machines, creating and injecting a virus using BVM Tool, writing a batch program to execute on victim machines, performing SQL injection using Havij Tool, sniffing data using Wireshark, cloning a Facebook page for phishing, and encrypting/decrypting data in images and command prompt using quick stego tool. The student is instructed to write reports with screenshots for each task and suggested solutions, and only use virtual machines to avoid misuse.

Uploaded by

Shravan Kumar N
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Minor Project

• Project Name:
Cyber Security February Minor Project
• Problem Statement:-
• Perform Foot printing on Microsoft Website and gather information about website by using
online Websites (Whois / netcraft / Shodan / dnsdumpster., etc.) as much as possible and write
report on gathered info along with screenshots
• Test the System Security by using PRORAT / Darkcommet (Anyone Tool) Trojan by hacking
virtual machine and try to take screenshots & Keystrokes along with change data in Desktop.
Write a report on vulnerability issue along with screenshots how you performed and suggest
the security patch to avoid these type of attacks
Hacker Machine : Windows 7 / Windows 10
Victim machine : Windows XP / Windows 7
• Use BVM Tool (Download from Internet) to create a virus and inject in to Virtual system and
perform destruction program as per your wish and write a document along with screenshots
and suggest the preventive measures to avoid this malware affect
Hacker Machine : Windows 7 / Windows 10
Victim machine : Windows XP / Windows 7
• Write a small batch program and save as .bat extension and execute in victim machine
(Windows 7 /Windows 10 / Windows XP)
• Perform SQL injection on by using Havij Tool(Download it from Internet) on
http://testphp.vulnweb.com Write a report along with screenshots and mention preventive
steps to avoid SQL injections
• Use Wireshark Tool(Download it from Internet) to sniff the data and try to get the username
and password of http://demo.testfire.net/
• Clone a Facebook page and try to perform Desktop Phishing in your local machine and capture
the credentials and write the document along with screenshots and suggest the solution to
avoid from phishing
• Try to Encrypt the Data in image file using quick stego tool (Download from Internet) and
command prompt also and show them how to decrypt also. Write a report advantages of
cryptography and steganography)
Note:
1. Write a Document with on each task along with screenshots and after attack
mention the solutions to avoid those attacks
2. Use Only Virtual Machines to perform the tasks
3. Don’t try these attacks on real-time environment, we won’t be responsible for
any misuse
4. Create a New lab with all the Operating system and practice on that
5. Refer Internet resources for solutions and complete the project within given
date.

You might also like