Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
5 views
NIS
NIS Micro project for computer engineering branch last semester
Uploaded by
Hitesh Patil
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save NIS For Later
Download
Save
Save NIS For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
5 views
NIS
NIS Micro project for computer engineering branch last semester
Uploaded by
Hitesh Patil
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save NIS For Later
Carousel Previous
Carousel Next
Save
Save NIS For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 18
Search
Fullscreen
A Micro Project Report on Case Study Of Ethical Hacking Submitted by Mr Jagdish Pravin Patil Under the Guidance of Pr. D.M.Fegade In the Partial Fulfilment of sixthSemester of Diploma in Computer Engineering Affiliated to Maharashtra State Board of Technical Educati- Maharashtra State Board of Technical Education Certificate This is to certify that Mr. Jagdish Pravin Patil with Roll No-348has successfully completed Micro- project in course Network And Information Security for the academic year 2022-23 as prescribed in the ‘Assessment Manual during hisher tenure of completing Sixth Semester of Diploma Programme in Computer Engineering from institute, .S.Putil Institute of technology (polytechnic) ,Chopda Place: Chopda Enrollment No: 2100610136. Date: Exam Seat No:380102 Course Teacher Head of the Department Head of the InstituteAbstract: Hacking is basically expertise in any field. Hackers are classified as per w orking and as per knowledge. The et hical hackers come under white hat hackers. Ethical hackers use hacking techniques in order to provide secur ity. They are legally authorized hack ers. Various tools are used in order t 0 carry out hacking. The most comm on hacking technique used is phishin g. Since, there is a rapid growth in th e number of attack, there is a need f or people to learn ethical hacking co ncepts to secure themselvesSR.NO. CONTENT PAGE NO. Introduction » Need of ethical Types of Ethical Hacking © Web application hacking Social engineering @ System hacking e Hacking wireless networks © Web server hacking 4 types of Ethical Hackers 1) White Hat Hackers 2)Black Hat Hackers 3)Grey Hat Hackers 4)Miscellaneous Hackers s Professional Hackers in India ConclusionIntroduction To crack passwords or to steal data? No, it is much more than that. Ethical hacking is to scan vulnerabilities and to find potential threats on a computer or networks. An ethical hacker finds the weak points or loopholes in a computer, web applications or network and reports them to the organization. So, let’s explore more about Ethical Hacking step-by-step. Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. An example of computer hacking can be: using a password cracking algorithm to gain access to a computer system.ait} Security Neem taca y | Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. System hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.Who is a Hacker? A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Need of ethical hacking We hear that attackers are hacked the big companies and big systems. Sometimes ago, a hacker hacked the Uber website. Due to this, the important information of around 50 million users was exposed. Many big companies like Google, Yahoo, Instagram, Facebook, Uber, they hire hackers. The hackers try to hack their systems. After hacking the system, they tell all the places where they found the weakness so that the company can fix it. Many companies also perform bug bounty programs. In this program, all the hackers around the world try to hack thewebsite or web of that company. If the hacker finds any bug, the company will pay them a reward for the bug. Ethical hacking is used to secure important data from enemies. It works as a safeguard of your computer from blackmail by the people who want to exploit the vulnerability. Using ethical hacking, a company or organization can find out security vulnerability and risks. types of ethical hacking @ Web application hacking Social engineering @ System hacking e Hacking wireless networks @ Web server hacking Web application hacking Web Applications acts as an interface between the users and servers using web pagesthat consist of script code that is supposed to be dynamically executed. One can access web applications with the help of the internet or intranet. Web hacking in general refers to the exploitation of applications via Hypertext Transfer Protocol (HTTP) which can be done by manipulating the application through its graphical web interface, tampering the Uniform Resource Identifier (URI) or exploiting HTTP elements. Social Engineering In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con"in that it is often one of many steps in a more complex fraud scheme. System Hacking System hacking is a vast subject that consists of hacking the different software-based technological systems such as laptops, desktops, etc. System hacking is defined as the compromise of computer systems and software to access the target computer and steal or misuse their sensitive information. Here the malicious hacker exploits the weaknesses in a computer system or network to gain unauthorized access to its data or take illegal advantage. Hacking wireless networks Cracking a wireless network is defeating the security of a wireless local-area network (back-jack wireless LAN). A commonly used wireless LAN is a Wi-Fi network. WirelessLANs have inherent security weaknesses from which wired networks are exempt. Wireless cracking is an information network attack similar to a direct intrusion. Two frequent types of vulnerabilities in wireless LANs are those caused by poor configuration, and those caused by weak or flawed security protocols. Web Server Hacking Over the past decade, more individuals have access to the internet than ever before. Many organizations develop web-based applications, which their users can use to interact with them. But improper configuration and poorly written codes in web servers are a threat and can be used to gain unauthorized access to the servers’ sensitive data. This article tries to give an overview on Web Servers. We will be covering some topics which include working of a server, top web servers in the industry,web server vulnerabilities, webserver attacks, tools and some counter measures to protect against such attacks. Types of Ethical Hackers 5) White Hat Hackers 6) Black Hat Hackers 7) Grey Hat Hackers 8) Miscellaneous Hackers Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat.White Hat Hackers White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are numerous companies that hire ethical hackers for penetration testing and vulnerability assessments. 2)Black Hat Hackers Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information. Black Hat hacking is always illegal because of its bad intent which includes stealingcorporate data, violating privacy, damaging the system, blocking network communication, etc. 3)Grey Hat Hackers Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge. Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty from the owners. 4) Miscellaneous Hackers Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it — 1) Red Hat HackersRed hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information. 2) Blue Hat Hackers A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events. 3) Elite Hackers This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. 4) Script KiddieA script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie. 5) Neophyte A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. 6) Hacktivist A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof-service attacks.List of Top 10 Best Professional Hackers in India @ Vivek Ramachandran e Benild Joseph e Ankit Fadia e Sunny Vaghela e Falgun Rathod e Anand Prakash e Koushik Dutta e Pranav Mistry @ Trishnit Arora e Rahul TyagiConclusion In conclusion, ethical hacking is not a criminal activity and should not be considered as such. While it is true that malicious hacking is a computer crime and criminal activity, ethical hacking is never a crime. Ethical hacking is in line with industry regulation and organizational IT policies. Malicious hacking should be prevented while ethical hacking which promotes research, innovation, and technological breakthroughs should be encouraged and allowed
You might also like
Certified Blackhat Methodology To Unethical Hacking
PDF
100% (1)
Certified Blackhat Methodology To Unethical Hacking
135 pages
Study of Ethical Hacking: Micro Project
PDF
No ratings yet
Study of Ethical Hacking: Micro Project
19 pages
A Report On Ethical Hacking
PDF
71% (7)
A Report On Ethical Hacking
22 pages
Abstract
PDF
No ratings yet
Abstract
23 pages
Unit 1 Intro & Types of Hacking
PDF
No ratings yet
Unit 1 Intro & Types of Hacking
11 pages
ETI
PDF
No ratings yet
ETI
12 pages
INTRO
PDF
No ratings yet
INTRO
18 pages
Ethical Hacking Notes
PDF
No ratings yet
Ethical Hacking Notes
11 pages
Ethical Hacking
PDF
100% (1)
Ethical Hacking
25 pages
Cyber Security_SG_Module 07
PDF
No ratings yet
Cyber Security_SG_Module 07
17 pages
1.intro To Ethical Hacking
PDF
No ratings yet
1.intro To Ethical Hacking
5 pages
Unit 5
PDF
No ratings yet
Unit 5
26 pages
Overview of Hacking: Sova Pal (Bera)
PDF
No ratings yet
Overview of Hacking: Sova Pal (Bera)
3 pages
Hacking & Ethical Hacking
PDF
No ratings yet
Hacking & Ethical Hacking
26 pages
Intro CS
PDF
No ratings yet
Intro CS
35 pages
Ethical Hacking and Cyber Security
PDF
No ratings yet
Ethical Hacking and Cyber Security
5 pages
Ethical Hacking
PDF
No ratings yet
Ethical Hacking
11 pages
Ethical Hacking
PDF
No ratings yet
Ethical Hacking
14 pages
Eti Micro Project
PDF
No ratings yet
Eti Micro Project
20 pages
Madhav Institute of Technology & Science, Gwalior
PDF
No ratings yet
Madhav Institute of Technology & Science, Gwalior
11 pages
Eti Mic
PDF
No ratings yet
Eti Mic
8 pages
Ethical Hacking Micro Project
PDF
0% (1)
Ethical Hacking Micro Project
14 pages
Seminar Report
PDF
100% (2)
Seminar Report
18 pages
Chapter 3. Lesson 5 Hacking
PDF
No ratings yet
Chapter 3. Lesson 5 Hacking
51 pages
Ethical Hacking Tools - A Situational Awareness - 1605784998
PDF
No ratings yet
Ethical Hacking Tools - A Situational Awareness - 1605784998
6 pages
Introducton - 1
PDF
No ratings yet
Introducton - 1
10 pages
Ethical Hacking and Hacking Attacks
PDF
100% (1)
Ethical Hacking and Hacking Attacks
9 pages
ETI Micro Project 39 To 42
PDF
0% (1)
ETI Micro Project 39 To 42
20 pages
AI&CT Research Paper Assigment (Final)
PDF
No ratings yet
AI&CT Research Paper Assigment (Final)
10 pages
Ethical Hacking Abstract
PDF
No ratings yet
Ethical Hacking Abstract
6 pages
Computer Hacking - A Beginners Guide To Computer Hacking, How To Hack, Internet Skills, Hacking ... (PDFDrive)
PDF
No ratings yet
Computer Hacking - A Beginners Guide To Computer Hacking, How To Hack, Internet Skills, Hacking ... (PDFDrive)
17 pages
Introduction To Ethical Hacking
PDF
No ratings yet
Introduction To Ethical Hacking
44 pages
HACKING The Ultimate Hacking For Beginners
PDF
No ratings yet
HACKING The Ultimate Hacking For Beginners
238 pages
Ethical Hacking and Hacking Attacks
PDF
No ratings yet
Ethical Hacking and Hacking Attacks
12 pages
Approach To Hackiing in Cameroon:Overview and Mitigation Techniques
PDF
No ratings yet
Approach To Hackiing in Cameroon:Overview and Mitigation Techniques
14 pages
Ethical Hacking: BSC Computer Science
PDF
No ratings yet
Ethical Hacking: BSC Computer Science
31 pages
hacking[1]
PDF
No ratings yet
hacking[1]
25 pages
Ethics Project Report
PDF
No ratings yet
Ethics Project Report
13 pages
Ethical Hacking: Deepak Kumar, Ankit Agarwal, Abhishek Bhardwaj
PDF
No ratings yet
Ethical Hacking: Deepak Kumar, Ankit Agarwal, Abhishek Bhardwaj
3 pages
IJCST V2I6P2 Author Bhawana Sahare Anki
PDF
No ratings yet
IJCST V2I6P2 Author Bhawana Sahare Anki
5 pages
MODULE 1
PDF
No ratings yet
MODULE 1
28 pages
Ethical Hacking IJERTCONV4IS06008
PDF
No ratings yet
Ethical Hacking IJERTCONV4IS06008
3 pages
Ethical Hacking in Linux Environment: Aniruddha P Tekade, Pravin Gurjar, Pankaj R. Ingle, Dr.B.B.Meshram
PDF
No ratings yet
Ethical Hacking in Linux Environment: Aniruddha P Tekade, Pravin Gurjar, Pankaj R. Ingle, Dr.B.B.Meshram
7 pages
Introduction
PDF
No ratings yet
Introduction
11 pages
Guransh Project Report F
PDF
No ratings yet
Guransh Project Report F
34 pages
Cyber Security Handbook
PDF
No ratings yet
Cyber Security Handbook
108 pages
Ethical Hacking
PDF
No ratings yet
Ethical Hacking
21 pages
Ethical Hacking Guide-Esy Understanding
PDF
100% (1)
Ethical Hacking Guide-Esy Understanding
250 pages
Hacking
PDF
No ratings yet
Hacking
25 pages
HACKING
PDF
No ratings yet
HACKING
19 pages
Report Ethical
PDF
No ratings yet
Report Ethical
17 pages
ANIK CHATTERJEE - Cyber
PDF
No ratings yet
ANIK CHATTERJEE - Cyber
10 pages
Seminarreport 8
PDF
No ratings yet
Seminarreport 8
15 pages
Ethical Hacking: Keith Brooks CIO and Director of Services Vanessa Brooks, Inc. Twitter/Skype: Lotusevangelist
PDF
No ratings yet
Ethical Hacking: Keith Brooks CIO and Director of Services Vanessa Brooks, Inc. Twitter/Skype: Lotusevangelist
34 pages
Ethical Hacking: Keith Brooks CIO and Director of Services Vanessa Brooks, Inc. Twitter/Skype: Lotusevangelist
PDF
No ratings yet
Ethical Hacking: Keith Brooks CIO and Director of Services Vanessa Brooks, Inc. Twitter/Skype: Lotusevangelist
34 pages
Hacking Types
PDF
No ratings yet
Hacking Types
15 pages
Eti 1
PDF
No ratings yet
Eti 1
26 pages
Related titles
Click to expand Related Titles
Carousel Previous
Carousel Next
Certified Blackhat Methodology To Unethical Hacking
PDF
Certified Blackhat Methodology To Unethical Hacking
Study of Ethical Hacking: Micro Project
PDF
Study of Ethical Hacking: Micro Project
A Report On Ethical Hacking
PDF
A Report On Ethical Hacking
Abstract
PDF
Abstract
Unit 1 Intro & Types of Hacking
PDF
Unit 1 Intro & Types of Hacking
ETI
PDF
ETI
INTRO
PDF
INTRO
Ethical Hacking Notes
PDF
Ethical Hacking Notes
Ethical Hacking
PDF
Ethical Hacking
Cyber Security_SG_Module 07
PDF
Cyber Security_SG_Module 07
1.intro To Ethical Hacking
PDF
1.intro To Ethical Hacking
Unit 5
PDF
Unit 5
Overview of Hacking: Sova Pal (Bera)
PDF
Overview of Hacking: Sova Pal (Bera)
Hacking & Ethical Hacking
PDF
Hacking & Ethical Hacking
Intro CS
PDF
Intro CS
Ethical Hacking and Cyber Security
PDF
Ethical Hacking and Cyber Security
Ethical Hacking
PDF
Ethical Hacking
Ethical Hacking
PDF
Ethical Hacking
Eti Micro Project
PDF
Eti Micro Project
Madhav Institute of Technology & Science, Gwalior
PDF
Madhav Institute of Technology & Science, Gwalior
Eti Mic
PDF
Eti Mic
Ethical Hacking Micro Project
PDF
Ethical Hacking Micro Project
Seminar Report
PDF
Seminar Report
Chapter 3. Lesson 5 Hacking
PDF
Chapter 3. Lesson 5 Hacking
Ethical Hacking Tools - A Situational Awareness - 1605784998
PDF
Ethical Hacking Tools - A Situational Awareness - 1605784998
Introducton - 1
PDF
Introducton - 1
Ethical Hacking and Hacking Attacks
PDF
Ethical Hacking and Hacking Attacks
ETI Micro Project 39 To 42
PDF
ETI Micro Project 39 To 42
AI&CT Research Paper Assigment (Final)
PDF
AI&CT Research Paper Assigment (Final)
Ethical Hacking Abstract
PDF
Ethical Hacking Abstract
Computer Hacking - A Beginners Guide To Computer Hacking, How To Hack, Internet Skills, Hacking ... (PDFDrive)
PDF
Computer Hacking - A Beginners Guide To Computer Hacking, How To Hack, Internet Skills, Hacking ... (PDFDrive)
Introduction To Ethical Hacking
PDF
Introduction To Ethical Hacking
HACKING The Ultimate Hacking For Beginners
PDF
HACKING The Ultimate Hacking For Beginners
Ethical Hacking and Hacking Attacks
PDF
Ethical Hacking and Hacking Attacks
Approach To Hackiing in Cameroon:Overview and Mitigation Techniques
PDF
Approach To Hackiing in Cameroon:Overview and Mitigation Techniques
Ethical Hacking: BSC Computer Science
PDF
Ethical Hacking: BSC Computer Science
hacking[1]
PDF
hacking[1]
Ethics Project Report
PDF
Ethics Project Report
Ethical Hacking: Deepak Kumar, Ankit Agarwal, Abhishek Bhardwaj
PDF
Ethical Hacking: Deepak Kumar, Ankit Agarwal, Abhishek Bhardwaj
IJCST V2I6P2 Author Bhawana Sahare Anki
PDF
IJCST V2I6P2 Author Bhawana Sahare Anki
MODULE 1
PDF
MODULE 1
Ethical Hacking IJERTCONV4IS06008
PDF
Ethical Hacking IJERTCONV4IS06008
Ethical Hacking in Linux Environment: Aniruddha P Tekade, Pravin Gurjar, Pankaj R. Ingle, Dr.B.B.Meshram
PDF
Ethical Hacking in Linux Environment: Aniruddha P Tekade, Pravin Gurjar, Pankaj R. Ingle, Dr.B.B.Meshram
Introduction
PDF
Introduction
Guransh Project Report F
PDF
Guransh Project Report F
Cyber Security Handbook
PDF
Cyber Security Handbook
Ethical Hacking
PDF
Ethical Hacking
Ethical Hacking Guide-Esy Understanding
PDF
Ethical Hacking Guide-Esy Understanding
Hacking
PDF
Hacking
HACKING
PDF
HACKING
Report Ethical
PDF
Report Ethical
ANIK CHATTERJEE - Cyber
PDF
ANIK CHATTERJEE - Cyber
Seminarreport 8
PDF
Seminarreport 8
Ethical Hacking: Keith Brooks CIO and Director of Services Vanessa Brooks, Inc. Twitter/Skype: Lotusevangelist
PDF
Ethical Hacking: Keith Brooks CIO and Director of Services Vanessa Brooks, Inc. Twitter/Skype: Lotusevangelist
Ethical Hacking: Keith Brooks CIO and Director of Services Vanessa Brooks, Inc. Twitter/Skype: Lotusevangelist
PDF
Ethical Hacking: Keith Brooks CIO and Director of Services Vanessa Brooks, Inc. Twitter/Skype: Lotusevangelist
Hacking Types
PDF
Hacking Types
Eti 1
PDF
Eti 1