0% found this document useful (0 votes)
25 views26 pages

Eti 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views26 pages

Eti 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

JSPM’s

JAYWANTRAO SAWANT POLYTECHNIC


DEPARTMENT OF COMPUTER
ENGINEERING

MICRO PROJECT
Academic year: 2023-24

TITLE OF PROJECT

Describe Different Types of Hacking

Program: CO Program code:


CO6I Course:ETI Course code: 22618
Class: TYCO3
Submitted By:
1.NikitaPanchal

2. Nikita Avchar

Guided By:

Mrs.R.F.Shikhare
DEPARTMENT OF
COMPUTER
ENGINEERING

MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that
Mr/Ms Nikita Panchal,Nikita Avchar Roll No:112,143of Semester Sixth of
Diploma in Computer Engineering of Institute, JS POLYTECHNIC (Code:0711)
has completed the Micro Project satisfactorily in Subject- Emerging Trends in
Computer and Information Technology (22618)for the academic year 2023-
2024 as prescribed in the curriculum.
Place: Hadapsar, Pune Enrollment No:

2107110455

2207110678

Date: Exam Seat No:

Subject Teacher Head of the Department Principal


Acknowledgment

We would like to express our special thanks of gratitude to our subject teacher
Ms.S.R.Rajbhoj as well as our principal sir and HOD sir who gave us the golden
opportunity to do this wonderful Report on the topic Describe Different Types of
Hacking
of In which also helped us doing lot of Research and we came to know about so
many new things related to Emerging Trends in Computer and Information
Technology (22618) we are really thankful to them.
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-
28 Academic Year 2023-2024

INDEX

Sr No contain Page No
1 Front page

2 Certificate

3 Acknowledgement

4 Abstract

5
Introduction
to hacking

6 Types of
hacking
There are
three main
7 types of
hacking
8 Advantages
and
disadvantage
s

Conclusion
9

References
10
Abstract

Chat application is a feature or a program on the Internet to communicate directly among Internet users who
are online or who were equally using the internet. Chat applications allow users to communicate even though from a
great distance. Therefore, this chat application must be real-time and multi-platform to be used by many users. The
development of information and communication technologies are rapidly making one of the reasons for Indonesia,
especially Bandung to develop this chat application. That's because Indonesia does not always rely on outsiders. It is
important for Indonesia to develop this chat application for themselves. This chat application in the manufacture
begins with the collection of relevant data that will be displayed in the web and mobile versions.
INTRODUCTION

Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to
gain access to personal data or business data. An example of computer hacking can be: using a password
cracking algorithm to gain access to a computer system. Computers have become mandatory to run a
successful business. It is not enough to have isolated computers systems; they need to be networked
to facilitate communication with external businesses. This exposes them to the outside world and
hacking. System hacking means using computers to commit fraudulent acts such as fraud, privacy
invasion, stealing corporate/personal data, etc. Cybercrimes cost many organizations millions of dollars
every year. Businesses need to protect themselves against such attacks. Hacking refers to activities that
seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.
And while hacking might not always be for malicious purposes, nowadays most references to hacking, and
hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain,
protest, information gathering (spying), and even just for the “fun” of the challenge. A commonly used
hacking definition is the act of compromising digital devices and networks through unauthorized access to an
account or computer system. Hacking is not always a malicious act, but it is most commonly
associated with illegal activity and data theft by cyber criminals. Hacking in cyber security refers to the
misuse of devices like computers, smartphones, tablets, and networks to cause damage to or corrupt systems,
gather information on users, steal data and documents, or disrupt data-related activity. A traditional view of
hackers is a lone rogue programmer who is highly skilled in coding and modifying computer software and
hardware systems. But this narrow view does not cover the true technical nature of hacking. Hackers are
increasingly growing in sophistication, using stealthy attack methods designed to go completely
unnoticed by cybersecurity software and IT teams. They are also highly skilled in creating attack vectors that
trick users into opening malicious attachments or links and freely giving up their sensitive personal data.
ethical hacking is a process that helps improve the security of computer systems by identifying potential
weaknesses and vulnerabilities during their testing. It is done by professionals who have authorized access to
the computer and networks to report loopholes in the system of an organization to safeguard it from future
attacks or malicious users. Ethical hackers use the same techniques and tools that black hat hackers use
except that they have the authorization to report weak points in an organization’s network or computing
environment while protecting the security and privacy of that information
Types of Hacking

1) Phishing – In this type of hacking, hackers’ intention is to steal critical


information of unlike account passwords, MasterCard detail, etc. For example,
hackers can replicate an original website for users’ interaction and can steal
critical information from the duplicate website the hacker has created.
2) Virus – These are triggered by the hacker into the filters of the website
once they enter into it. The purpose is to corrupt the information or resources
on the net website.
3) UI redress – In this technique, the hacker creates a pretend interface and
once the user clicks with the intent of progressing to a particular website,
they are directed to a special website.

4) Cookie theft – Hackers access the net website exploitation malicious


codes and steal cookies that contain tips, login passwords, etc. Get access to
your account then will do any factor besides your account. o Distributed
Denial-of-service(DDoS) – This hacking technique is aimed toward taking
down a website so that a user cannot access it or deliver their service. Gets the
server down and stops it from responding, which may cause a condition error
constantly.

5) DNS spoofing – This essentially uses the cache knowledge of an internet


website or domain that the user might have forgotten keeping up to date. It
then directs the data to a distinct malicious website. o Social Engineering –
Social engineering is an attempt to manipulate you to share personal
info, sometimes by impersonating a trustworthy supply.

6) Malware-Injection Devices – Cyber-criminals will use hardware to sneak


malware onto your pc. You would have detected infected USB sticks which
can allow hackers remote access to your device when it is connected to your
pc.

 There are three main types of hacking


1) Black hat hackers
Black hat hackers are cybercriminals that illegally crack systems with malicious intent. Seeking to gain
unauthorized access to computer systems is the definition of black hat hacking. Once a black hat hacker finds a
security vulnerability, they try to exploit it, often by implanting a virus or other type of malware such as a
trojan. Ransomware attacks are another favoured ploy that black hat hackers use to extort financial gains or
breach data systems.
2) White hat hackers
White hat hackers are ethical security hackers who identify and fix vulnerabilities. Hacking into systems
with the permission of the organizations they hack into, white hat hackers try to uncover system weaknesses in
order to fix them and help strengthen a system’s overall security. Many cybersecurity leaders started out as
white hat hackers, but the vital role played by ethical hacking is still widely misunderstood, as made clear
by a recent ethical hacking case in Germany.

3) Gray hat hackers


Gray hat hackers may not have the criminal or malicious intent of a black hat hacker, but they also don’t
have the prior knowledge or consent of those whose systems they hack into. Nevertheless, when gray
hat hackers uncover weaknesses such as zero-day vulnerabilities, they report them rather than fully exploiting
them. But Gray hat hackers may demand payment in exchange for providing full details of what they
uncovered
t = Tiles(screen,

tile_print_position[( i, j)][0],

tile_print_position[(i, j)][1],

tile_no[k], i, j)

tiles.append(t)

matrix[i][j] = tile_no[k]

k += 1

check_mobility()

check_mobility()

# check if the tile can be places on

the # required position where the

# player is trying to move the

tile def check_mobility():

for i in range(tile_count):

tile = tiles[i]

row_index =

tile.position_x col_index =

tile.position_y

adjacent_cells = []

adjacent_cells.append([row_index-1, col_index, False]) # up

adjacent_cells.append([row_index+1, col_index, False]) # down

adjacent_cells.append([row_index, col_index-1, False]) # right

adjacent_cells.append([row_index, col_index+1, False]) # left

for i in range(len(adjacent_cells)):

if (adjacent_cells[i][0] >= 0 and adjacent_cells[i][0] < rows) and (adjacent_cells[i][1] >= 0 and adjacent_cells[i][1]
< cols):

adjacent_cells[i][2] = True

for j in range(len(adjacent_cells)):

if adjacent_cells[j][2]:

adj_cell_row = adjacent_cells[j][0]

adj_cell_col = adjacent_cells[j][1]

for k in range(tile_count):
if adj_cell_row == tiles[k].position_x and adj_cell_col == tiles[k].position_y:

adjacent_cells[j][2] = False
alse_count =

for m in

range(len(adjacent_cells)): if

adjacent_cells[m][2]:

tile.movable = True

break

else:

false_count += 1

if false_count == 4:

tile.movable =

False

# if after iterating the matrix the

# string we get is 12345678_

then

# the player has won("Game

Over") def isGameOver():

global game_over, game_over_banner

allcelldata = ""

for i in range(rows):

for j in range(cols):

allcelldata = allcelldata + str(matrix[i][j])

if allcelldata == "12345678 ":

game_over = True

game_over_banner = "Game

Over" print("Game Over")

for i in range(tile_count):

tiles[i].movable =

False tiles[i].selected =

False # Window

dimension

page_width, page_depth = pyautogui.size()

page_width = int(page_width * .95)

page_depth = int(page_depth * .95)


# tile dimensions

tiles = [1]
tile_width = 200

tile_depth = 200

# no of rows & column i.e puzzle

size rows, cols = (3, 3)

tile_count = rows * cols - 1 # how many tiles should be created

matrix = [["" for i in range(cols)] for j in range(rows)]

tile_no = []

tile_print_position = {(0, 0): (100, 50),

(0, 1): (305, 50),

(0, 2): (510, 50),

(1, 0): (100, 255),

(1, 1): (305, 255),

(1, 2): (510, 255),

(2, 0): (100, 460),

(2, 1): (305, 460),

(2, 2): (510, 460)}

# initial values of

variables mouse_press =

False

x_m_click, y_m_click = 0, 0

x_m_click_rel, y_m_click_rel = 0,

0 game_over = False

game_over_banner = ""

# initialize pygame and set the

caption pygame.init()

game_over_font = pygame.font.Font('freesansbold.ttf', 70)

move_count = 0

move_count_banner = "Moves : "

move_count_font = pygame.font.Font('freesansbold.ttf', 40)

screen = pygame.display.set_mode((page_width, page_depth))

pygame.display.set_caption("Slide Game")

font = pygame.font.Font('freesansbold.ttf', 200)


# creation of tiles in the

puzzle create_tyles()

running = True

while running:

screen.fill((0, 0, 0)) # fill with black color

# start drawing the gui board of sliding puzzle

pygame.draw.rect(screen, (165, 42, 42), pygame.Rect(95, 45, 620, 620))

game_over_print = game_over_font.render(

game_over_banner, True, (255, 255, 0))

# blit() will take that rectangular

Surface # and put it on top of the screen.

screen.blit(game_over_print, (950, 100))

# render the move_count with the use of

str if move_count == 0:

move_count_render =

move_count_font.render( move_count_banner,

True, (0, 255, 0))

else:

move_count_render = move_count_font.render(

move_count_banner + str(move_count), True, (0, 255, 0))

screen.blit(move_count_render, (1050, 200))

# Get events from the queue.

for event in pygame.event.get():

# if its quite operation then exit the while loop

if event.type == pygame.QUIT:

running = False

# if mouse click are detected then find (x,y)

# and then pass them to mouse_hover method

if event.type == pygame.MOUSEMOTION:

x_m_motion, y_m_motion = pygame.mouse.get_pos()

for i in range(tile_count):

tiles[i].mouse_hover(x_m_motion, y_m_motion)
# if the tile is selected & mouse is pressed

# then pass the coords to move_tyle

method for i in range(tile_count):

if tiles[i].selected and mouse_press: tiles[i].move_tyle(x_m_motion, y_m_motion)

# Moving tile downwards

if event.type == pygame.MOUSEBUTTONDOWN:

mouse_press = True

x_m_click, y_m_click = pygame.mouse.get_pos()

for i in range(tile_count):

tiles[i].mouse_click(x_m_click, y_m_click)

# Moving tile upwards

if event.type == pygame.MOUSEBUTTONUP:

mouse_press = False

x_m_click_rel, y_m_click_rel = pygame.mouse.get_pos()

x_m_click, y_m_click = 0, 0

cell_found = False

for i in range(0, rows):

for j in range(0, cols):

tile_start_pos_x = tile_print_position[(i, j)][0]

tile_start_pos_y = tile_print_position[(i, j)][1]

if (x_m_click_rel > tile_start_pos_x and x_m_click_rel < tile_start_pos_x + tile_width) and (y_m_click_rel >
tile_start_pos_y and y_m_click_rel < tile_start_pos_y + tile_depth):

if matrix[i][j] == "":

for k in range(tile_count):

if game_over == False:

if tiles[k].selected:

if tiles[k].movable:

cell_found = True

dummy = matrix[tiles[k].position_x][tiles[k].position_y]

matrix[tiles[k].position_x][tiles[k].position_y] = matrix[i][j]

matrix[i][j] = dummy

tiles[k].position_x = i
tiles[k].position_y = j

tiles[k].start_pos_x = tile_print_position[(

i, j)][0]

tiles[k].start_pos_y =

tile_print_position[( i, j)][1]

move_count += 1

isGameOver()

check_mobility()

if cell_found == False:

for k in range(tile_count):

if tiles[k].selected:

mat_pos_x = tiles[k].position_x

mat_pos_y = tiles[k].position_y

tiles[k].start_pos_x =

tile_print_position[( mat_pos_x,

mat_pos_y)][0]

tiles[k].start_pos_y = tile_print_position[(

mat_pos_x, mat_pos_y)][1]

brack

for i in range(tile_count):

tiles[i].draw_tyle()

# allows only a portion of the screen to updated,

# instead of the entire area,

# If no argument is passed it

# updates the entire Surface area like pygame.

pygame.display.flip()

# Update the whole

screen

pygame.display.update()
Output
Conclusion

A two Player Puzzle game , which we can play on the command line. Python is generally utilized for
creating websites and software , task automation , data analysis , and data visualization
JSPM’s
JAYWANTRAO SAWANT POLYTECHNIC
DEPARTMENT OF COMPUTER
ENGINEERING

Aim/Benefits Of The Micro Project


– Solving puzzles helps to enhance the connections that already exist between our brain cells. It also boosts
the number of new relationships formed. As a result, mental quickness and cognitive processes improve.

Course Outcomes Achieved:

a. Develop group discussion skills


b. Communication skills Improved
c. MS Word Skills developed
d. Data collection skills
e. Python 3 programming skills

Action Plan:
Sr. Details of activity Planned Planned Name of
No start date Finish date Responsible
Team
members
1 Introduction 10th March 14th March
2 Design Of The Project 13th March 20th March 1. Ankita A
3 Understand Of The 15th March 24th March Mane
Project
4 24th March 27th March 2. Rohan D
Finally Running The
Shinde
Code
5 Output 28th March 30th March
3. Yash D
30th Marh 31th March Vibhute

4. Akib k Khan

6 Conclusion
Actual Resources Used:

Sr. Name of resource /


No. material Specification Quantity Remarks

1. PC Intel i7 1
vPro,8GB
RAM
2. Python IDE Windows -
/Linux
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer
Engineering Academic Year 2023-24
Teacher Evaluation Sheet

Nameofstudent:NikitaPanchaEnrollm

enNo: 2107110455

Name of program: Computer Engineering Semester: Sixth

CourseTitle: Programming With Python Code: 22616

Title of Micro Project: Develop Application For Puzzle Game In Python

Evaluation as per suggested Rubric for Assessment of Micro


Sr. Characteristic to be Poor Average Good Excellent
Project
No assessed (Marks1- 3) (Marks 4 -5) (Marks 6 (Marks 9 -
8) 10)
1 Relevance to the course
2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target
as per Project Proposal
5 Analysis of data and
representation
6 Quality of Prototype/
Model
7 Report preparation
8 Presentation
9 Defense
Micro Project Evaluation Sheet
Process Assessment Product Assessment Total
Marks
Part A - Project Par B - Project Individual
Project Methodology Report/ working Presentation/ 10
Proposal Model
(2 Marks) Viva (4 Marks)
(2 Marks) (2 Marks)

Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column

Name and Designation of the Faculty Member: Mrs.R.F.Shikhare

Signature: ………………………….
JSPM’s
JAYAWANTRAO SAWANT POLYTECHNIC,
Handewadi Road, Hadapsar, Pune-28
Department of Computer
Engineering Academic Year 2023-24
Teacher Evaluation Sheet
Name of student: Nikita AvcharEnrollment No: 2207110678
Name of program: Computer Engineering Semester: Sixth

CourseTitle: Programming With Python Code: 22616

Title of Micro Project: Develop Application For Puzzle Game In Python

Evaluation as per suggested Rubric for Assessment of Micro


Sr. Characteristic to be Poor Average Good Excellent
Project
No assessed (Marks1- 3) (Marks 4 -5) (Marks 6 (Marks 9 -
8) 10)
1 Relevance to the course
2 Literature Survey /
Information collection
3 Project Proposal
4 Completion of the Target
as per Project Proposal
5 Analysis of data and
representation
6 Quality of Prototype/
Model
7 Report preparation
8 Presentation
9 Defense

Micro Project Evaluation Sheet


Process Assessment Product Assessment Total
Marks
Part A - Project Par B - Project Individual
Project Methodology Report/ working Presentation/ 10
Proposal (2 Marks) Model
Viva (4 Marks)
(2 Marks) (2 Marks)

Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column

Name and Designation of the Faculty Member: Mrs.R.F.Shikhare

Signature: ………………………….
………….

You might also like