Project Report Ethical Hacking
Project Report Ethical Hacking
A Project Report
Submitted by
Shiven Sharma(21BCS7698)
Aditya Pokra(21bcs7649)
Gopal Karan(21BCS11699)
Chandigarh University
March 2023
1
BONAFIDE CERTIFICATE
Certified that this project report “Ethical Hacking in Phishing” is the Bonafide
work of “SHIVEN SHARMA (21BCS7698), ADITYA POKRA
(21BCS7649), GOPAL KARAN (21BCS)” who carried out the project work
under my/our supervision.
SIGNATURE SIGNATURE
Er. Kirandeep Kaur Dr. Ajay Kumar
SUPERVISOR HEAD OF DEPARTMENT
2
Acknowledgement
We would like to express our profound gratitude to Dr. Ajay Kumar, head of
the department, and our supervisors, Er. Gursimran Bakshi, Er. Kirandeep
Kaur for their contributions to the completion of our project titled “Ethical
Hacking in Phishing”.
It was a great privilege and honor to work and study under Kirandeep Ma’am
and Gursimran Ma’am guidance. We’re extremely grateful for what they have
offered us.
I would like to acknowledge that this project was completed entirely by us and
not by someone else.
3
TABLE OF CONTENTS
Page No.
Title Page…………………………………….…………….1
Acknowledgements………………………………………...3
Table Of Contents……………………………….….……...4
Abstract…………………………………………………….6
4
CHAPTER ONE
1.0 Introduction
1.4 Timeline…………………………………………………………..10
CHAPTER TWO
2.6 Goals/Objectives………………………………..………………...18
CHAPTER THREE
3.0 Process……………………….…………………………………...9
3.1 Flowchart…………………………………………………………10
CHAPTER FOUR
5
4.0 Result Analysis…………………………………………….……11
CHAPTER FIVE
5.0 Reference………………………………………………………...12
ABSTRACT
Hacking is essential knowledge in any area. Hackers are divided into working and
knowledgeable categories. Ethical hackers come under white hat hackers. Hacking methods
are employed by ethical hackers to offer security. These are certified hackers under the law.
Hacking involves the use of a variety of tools. Phishing is the most popular hacking
technique. Phishing is a form of social engineering where attackers deceive people into
revealing sensitive information or installing malware such as ransomware. Since the number
of attacks is increasing quickly, it is important for people to acquire ethical hacking principles
in order to protect themselves.
6
CHAPTER ONE
1.0 Introduction
The term phishing is derived from the word “fishing”, spelled using
what is commonly known as Haxor or L33T Speak. The logic of this
terminology is that an attacker uses “bait” to lure the victim and then
“fish” for the personal information they want to steal(1).
7
Not so long ago, Phishing played an important role in one of the most
vicious cyber-attacks that had a bad impact on Ukraine in 2015. Spear
phishing attacks were directed at the IT workers and network
administrators of different companies that handled electricity
distribution in Ukraine. A malicious MS Word document that
included a prompt to enable macros. After being activated, the macro
put the malicious software BlackEnergy3 on the computer, opening a
backdoor for the attackers. In the end, 30 substations were
successfully shut down, and 230,000 people were without electricity
for up to six hours. This illustration shows the strength and
devastation of a carefully thought-out and executed phishing attack. It
is also undeniable that even skilled IT specialists sometimes fail to
recognize these kinds of attacks (1).
Figure 1. This graph showcases the increase in the number of phishing attacks
from 2013-2019[1].
The issue with phishing is that attackers are always coming up with
fresh and innovative techniques to trick victims into thinking their
activities are connected to a reliable website or email. Phishers are
getting better at creating fake websites that look exactly like the real
thing. They've even started adding logos and pictures to their phishing
emails to increase their effectiveness. There are dangerous new
8
advanced phishing techniques that use publicly accessible personal
data to create realistic and convincing attacks that directly target
victims. Social phishing and context-aware phishing are some prime
examples of attacks that make use of as much available information
as possible to make their schemes more effective[2].
1.4 Timeline
CHAPTER TWO
10
2.1 Timeline of the Reported Problem
11
This timeline shows the development of phishing attempts and the
continuous difficulties security experts confront in thwarting them. It's
critical for people and organizations to maintain vigilance and follow best
practices for defending themselves against phishing attacks as fraudsters'
strategies continue to change.
12
Keep Your Browser Up to Date:
Popular browsers regularly get security updates revised. They are made
public in response to the security defects that hackers and other
cybercriminals inevitably find and use. Alerts to update the browser
should not be disregarded. Download and install any updates as soon as
they become available[5].
Use Firewalls:
firewalls serve as barriers between your computer and outside invaders. A
desktop firewall and a network firewall are the two types one should
utilize. A type of hardware is represented by the second option and a type
of software by the first. Together, they greatly minimize the likelihood
that hackers and phishers will get access to the computer or network[3].
Be Wary of Pop-Ups:
Pop-up windows frequently pose as useful elements of a website.
However, there are attempts at phishing to get access to the computer or
network. Pop-ups can be blocked in many popular browsers, and you can
choose to enable them in specific situations. Don't click the "cancel"
button if you do manage to get through the cracks; these buttons
frequently take you to phishing websites. Instead, click the tiny "x" in the
window's upper corner[6].
13
technology workarounds and vulnerabilities. Be sure that the software is
updated. Due to the constant invention of new strategies, new definitions
are always being added. Phishing attacks should be avoided by using
firewall and anti-spyware settings, and users should update their
programs frequently. By preventing the attacks, firewall defense restricts
access to harmful files. Every file that is downloaded to the computer
from the Internet is scanned by antivirus software. The system is
protected from harm as a result[3].
Ethical hacking
Penetration testing
Phishing
Cybersecurity
14
1998 1
1999 0
… …
2020 226
2021 125
3. Top journals:
Journal Number of
Publications
IEEE Transactions on Information Forensics and 78
Security
Journal of Computer and System Sciences 62
Computers & Security 53
4. Top authors:
15
Author Affiliation Number of
Publications
N. Christin Carneige Mellon University 24
M. Jakobsson George University 23
R. Anderson University of Cambridge 19
5. Co-citation analysis:
16
are constantly developing new techniques, and there may be other
vulnerabilities that have not yet been identified.
17
After thoroughly researching several studies and publications, we have
come to an agreement that phishing attacks have had a major impact on
the lives of unaware citizens. Banking transaction scams, social sites
scams, advertising and other ways to gather data from civilians under the
impression of good-doings. The challenge with phishing is that attackers
always come up with new and innovative methods to lure victims into
believing their actions are related to a genuine website or email. Phishers
are becoming more adept at producing phony websites that closely
resemble genuine ones. To make their phishing emails more effective,
they have even started including logos and images. There are susceptible
new advanced phishing techniques that use private data that is available
to the public to set up attacks that are specifically directed at victims.
Attacks that use as much accessible information as possible to make their
schemes more effective include social phishing and context-aware
phishing[5].
2.5 Goals/Objectives
Goal:
Objectives:
Test security measures: The second goal is to determine how well current
security measures work to identify and stop phishing attempts. In order to
assess the efficiency of security mechanisms like email filters, firewalls,
and intrusion detection systems, phishing simulations of actual attacks are
used.
19
software updates, or multi-factor authentication. It could also entail
creating guidelines and practises for staff awareness and training.
CHAPTER THREE
Types of phishing attacks: Identify and distinguish the most prominent phishing
attack types, including spear phishing, whaling, and clone phishing. These kinds
of attacks ought to be relevant to the study issue and reflect the current phishing
scene.
20
Data analysis: Decide whether data analysis methods, such as statistical analysis
or qualitative coding, will be employed. These methods should be suitable for
the chosen study question and requirements.
The study can offer a thorough and helpful analysis of ethical hacking in
phishing and contribute significantly to the field of cybersecurity by analyzing
and choosing the most pertinent and effective specifications for the research
paper.
Legal considerations: Legal issues, such as observing data protection rules and
regulations, may need to be taken into account when conducting research on
ethical hacking in phishing. Researchers must make sure their procedures are
legitimate and that they abide by all applicable legal standards.
Scope of research: The audience being researched, attack kinds, and ethical
hacking methodologies are just a few of the many variables that can come into
play when conducting research on ethical hacking in phishing. To prevent being
overly wide or unfocused, researchers must make sure their study has a distinct
and well-defined scope.
21
Availability of participants: Researchers on ethical hacking in phishing may
need to recruit people or organisations that are susceptible to phishing scams.
For their study, researchers must make sure they can collect a representative
sample of participants who represent the intended audience.
By analysing the features and finalizing the research paper subject to the
constraints, the study can provide a valuable contribution to the field of
cybersecurity, and inform future research and practice in ethical hacking in
phishing.
2. Scanning: The next step is to scan the target's system for vulnerabilities.
This involves using tools like port scanners and vulnerability scanners to
identify potential security flaws.
6. Reporting: Once the ethical hacker has completed their testing, they will
prepare a report detailing their findings. This report will outline any
23
vulnerabilities they discovered and provide recommendations for
remediation.
It's worth noting that ethical hacking should always be conducted with the
explicit permission and cooperation of the target organization. This ensures that
any vulnerabilities discovered can be remediated in a timely and effective
manner, and that the ethical hacker is operating within legal and ethical
guidelines.
Identify the scope: The first step in designing a solution is to identify the
scope of the project. This includes defining the target organization, the
systems and applications that will be tested, and the goals of the testing.
Select ethical hacking tools: Once the methodology has been selected,
the next step is to choose the appropriate ethical hacking tools. This could
24
include tools for reconnaissance, scanning, enumeration, exploitation, and
post-exploitation.
Develop the testing plan: With the tools in hand, the ethical hacker can
develop a testing plan that outlines the steps they will take to test the
target system. This should include a detailed timeline, as well as a list of
the vulnerabilities that will be tested.
Conduct the testing: The next step is to conduct the testing itself. This
may involve running automated tools, as well as manual testing to
identify more complex vulnerabilities.
Analyse the results: Once the testing is complete, the results must be
analysed to identify any vulnerabilities that were discovered. This
analysis should be performed by the ethical hacker, as well as any other
stakeholders involved in the project.
25
26
CHAPTER FIVE
5.0 References
1. Rana Alabdan et al, “Phishing Attacks Survey: Types, Vectors, and
Technical Approaches”, Department of Information Systems, College of
Computer and Information Sciences, Majmaah University, 2020.
2. K. Jansson* and R. von Solms, “Phishing for phishing awareness”,
Institute for ICT Advancement, Nelson Mandela Metropolitan University,
Port Elizabeth, South Africa,2011.
3. Omar Abahussain And Yousef Harrath, “Detection of Malicious Emails
through Regular Expressions and Databases”, Department of Computer
Science University of Bahrain Sakhir, Bahrain,2019.
4. Zainab Alkhalil, Chaminda Hewage , Liqaa Nawaf and Imtiaz Khan,
“Phishing Attacks: A Recent Comprehensive Study and a New
Anatomy”, Cardiff School of Technologies, Cardiff Metropolitan
University, Cardiff, United Kingdom,2021.
27
5. David Lacey et. al, “A Framework for Ethical Phishing Experiments”,
Berkeley technology law journal / Boalt Hall School of Law, University
of California, Berkeley,2019.
6. Markus Jakobsson et. Al, "Designing Effective Phishing Awareness
Training: Lessons from Social Psychology", Dept. of Psychology, School
of Informatics, Indiana University,2019.
7. Keshav Sood and Maninder Singh, “Phishing Detection Techniques: A
Comprehensive Survey” , School of Computer Science and Engineering,
Galgotias University,Greater Noida, India,2021.
8. K.S. Anitha and R. Priyadharshini, “A Study on Ethical Hacking and
Countermeasures Against Phishing Attacks” , Department of Computer
Science, Department of Computer Science, Federal University of
Agriculture, Abeokuta, Nigeria,2018.
9. L. Jean Camp et al. , “Evaluating the Effectiveness of Anti-Phishing
Training for End Users” , Department of Informatics and Cyber
Operations, University of Defence, 65 Kounicova Street, Brno, Czech
Republic,2018.
28