Jain
Jain
(S. A. T. I.),
Vidisha (M. P.), India
Internship report
Submitted by:
Name – Akshat Jain
Branch – Internet of Things
Year – 3rd year
Scholar Year – 31719
Project Name: Cyber Security Minor Project
Submitted to:
Mrs. Anusha Lahoti ma’am
Teacher’s Signature:
1
Table of Contents
1. Introduction 3.
2. Learning objectives 5.
3. Work description 7.
4. Summary 11.
5. Conclusion 13.
2
Introduction
3
The primary goal of an ethical hacker is to test and identify
vulnerabilities in an organization's system and correct them.
Ethical hacking is a technology career with specific skills,
and cybersecurity certifications help people break into the
field.
4
Learning objectives
Key Points:
5
• Ethical hackers must follow certain guidelines to
perform hacking legally.
• Ethical hacking is a technology career with specific
skills, and cybersecurity certifications help people
break into the field.
Guidelines for Ethical Hacking:
6
Work description
Clone a Facebook page and try to perform Desktop Phishing in
your local machine and capture the credentials and write the
avoid phishing.
3. Copy the whole source code and create a PHP file (index.php)
4. Now, search for string method=” POST”, it will give you two
5. Next, replace the action file name as “xyz.php” in the login form.
6. Now create a file “xyz.php” and “log.txt” and paste below code
in “xyz.php”.
7
Screenshots
8
9
0
10
Summary
To avoid phishing.
1. Keep Informed About Phishing Techniques – New
phishing scams are being developed all the time. Without
staying on top of these new phishing techniques, you could
inadvertently fall prey to one. Keep your eyes peeled for
news about new phishing scams. By finding out about them
as early as possible, you will be at much lower risk of getting
snared by one.
2. Think Before You Click! – It’s fine to click on links when
you’re on trusted sites. Clicking on links that appear in
random emails and instant messages, however, isn’t such
a smart move.
3. Install an Anti-Phishing Toolbar – Most popular Internet
browsers can be customized with anti-phishing toolbars.
Such toolbars run quick checks on the sites that you are
visiting and compare them to lists of known phishing sites.
4. Verify a Site’s Security – It’s natural to be a little wary
about supplying sensitive financial information online. As
long as you are on a secure website, however, you shouldn’t
run into any trouble.
5. Check Your Online Accounts Regularly – If you don’t visit
an online account for a while, someone could be having a
field day with it. Even if you don’t technically need to, check
in with each of your online accounts on a regular basis.
6. Keep Your Browser Up to Date – Security patches are
released for popular browsers all the time. They are released
11
in response to the security loopholes that phishers and
other hackers inevitably discover and exploit. If you
typically ignore messages about updating your browsers,
stop.
7. Keep Your Browser Up to Date – Security patches are
released for popular browsers all the time. They are released
in response to the security loopholes that phishers and
other hackers inevitably discover and exploit. If you
typically ignore messages about updating your browsers,
stop.
8. Be Wary of Pop-Ups – Pop-up windows often masquerade
as legitimate components of a website. All too often, though,
they are phishing attempts. Many popular browsers allow
you to block pop-ups; you can allow them on a case-by-case
basis.
9. Never Give Out Personal Information – As a general rule,
you should never share personal or financially sensitive
information over the Internet. This rule spans all the way
back to the days of America Online, when users had to be
warned constantly due to the success of early phishing
scams. If in doubt, go visit the main website of the company
in question, get their number and give them a call.
12
Conclusion
In conclusion, ethical hacking is an important practice in
13
Certificate and Internship
letter
14
15