0% found this document useful (0 votes)
7 views

Jain

The internship report by Akshat Jain from Samrat Ashok Technological Institute focuses on ethical hacking, outlining its purpose, guidelines, and techniques to identify vulnerabilities in systems. The report includes a project on phishing, detailing steps to clone a Facebook page and capture credentials, along with recommendations to avoid phishing attacks. It concludes by emphasizing the importance of ethical hacking in cybersecurity and the skills required for this career.

Uploaded by

Deshna Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Jain

The internship report by Akshat Jain from Samrat Ashok Technological Institute focuses on ethical hacking, outlining its purpose, guidelines, and techniques to identify vulnerabilities in systems. The report includes a project on phishing, detailing steps to clone a Facebook page and capture credentials, along with recommendations to avoid phishing attacks. It concludes by emphasizing the importance of ethical hacking in cybersecurity and the skills required for this career.

Uploaded by

Deshna Jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Samrat Ashok Technological Institute

(S. A. T. I.),
Vidisha (M. P.), India

Internship report

Submitted by:
Name – Akshat Jain
Branch – Internet of Things
Year – 3rd year
Scholar Year – 31719
Project Name: Cyber Security Minor Project

Submitted to:
Mrs. Anusha Lahoti ma’am

Teacher’s Signature:

1
Table of Contents

Sr. no. List of contents. Page no.

1. Introduction 3.

2. Learning objectives 5.

3. Work description 7.

4. Summary 11.

5. Conclusion 13.

6. Certificates & Letter of recommendation 14.

2
Introduction

Ethical hacking is an authorized practice of detecting


vulnerabilities in an application, system, or organization's
infrastructure and bypassing system security to identify
potential data breaches and threats in a network. Ethical
hackers aim to investigate the system or network for weak
points that malicious hackers can exploit or destroy. They
can improve the security footprint to withstand attacks
better or divert them. Ethical hacking involves the
authorized attempt to gain access to computer systems,
applications, or data by duplicating the strategies and
actions of malicious hackers, but in a lawful and legitimate
manner to assess the security posture of a target system.
Ethical hackers are security experts that perform security
assessments and provide remediation advice to
organizations. They are expected to follow specific guidelines
to perform hacking for organizations legally, including
obtaining complete approval before performing any security
assessment on the system or network.

3
The primary goal of an ethical hacker is to test and identify
vulnerabilities in an organization's system and correct them.
Ethical hacking is a technology career with specific skills,
and cybersecurity certifications help people break into the
field.

4
Learning objectives

Ethical hacking, also known as "white hat," hacking, is an


authorized practice of detecting vulnerabilities in an
application, system, or organization's infrastructure and
bypassing system security to identify potential data
breaches and threats in a network. Ethical hackers aim to
investigate the system or network for weak points that
malicious hackers can exploit or destroy. They can improve
the security footprint to withstand attacks better or divert
them. In this introduction, we will explore the basics of
ethical hacking.

Key Points:

• Ethical hacking is an authorized practice of detecting


vulnerabilities in an application, system, or
organization's infrastructure.
• Ethical hackers aim to investigate the system or
network for weak points that malicious hackers can
exploit or destroy.
• Ethical hacking is also known as "white hat" hacking.

5
• Ethical hackers must follow certain guidelines to
perform hacking legally.
• Ethical hacking is a technology career with specific
skills, and cybersecurity certifications help people
break into the field.
Guidelines for Ethical Hacking:

• An ethical hacker must seek authorization from the


organization that owns the system.
• Hackers should obtain complete approval before
performing any security assessment on the system or
network.
• Ethical hackers are expected to follow specific
guidelines to perform hacking for organizations legally.

6
Work description
Clone a Facebook page and try to perform Desktop Phishing in

your local machine and capture the credentials and write the

document along with screenshots and suggest the solution to

avoid phishing.

1. Open the Facebook login

2. Open the Facebook login page in your browser. Press ctrl+U to

find the source code.

3. Copy the whole source code and create a PHP file (index.php)

and paste it.

4. Now, search for string method=” POST”, it will give you two

results first for login and second for register.

5. Next, replace the action file name as “xyz.php” in the login form.

6. Now create a file “xyz.php” and “log.txt” and paste below code

in “xyz.php”.

7
Screenshots

8
9
0

10
Summary
To avoid phishing.
1. Keep Informed About Phishing Techniques – New
phishing scams are being developed all the time. Without
staying on top of these new phishing techniques, you could
inadvertently fall prey to one. Keep your eyes peeled for
news about new phishing scams. By finding out about them
as early as possible, you will be at much lower risk of getting
snared by one.
2. Think Before You Click! – It’s fine to click on links when
you’re on trusted sites. Clicking on links that appear in
random emails and instant messages, however, isn’t such
a smart move.
3. Install an Anti-Phishing Toolbar – Most popular Internet
browsers can be customized with anti-phishing toolbars.
Such toolbars run quick checks on the sites that you are
visiting and compare them to lists of known phishing sites.
4. Verify a Site’s Security – It’s natural to be a little wary
about supplying sensitive financial information online. As
long as you are on a secure website, however, you shouldn’t
run into any trouble.
5. Check Your Online Accounts Regularly – If you don’t visit
an online account for a while, someone could be having a
field day with it. Even if you don’t technically need to, check
in with each of your online accounts on a regular basis.
6. Keep Your Browser Up to Date – Security patches are
released for popular browsers all the time. They are released

11
in response to the security loopholes that phishers and
other hackers inevitably discover and exploit. If you
typically ignore messages about updating your browsers,
stop.
7. Keep Your Browser Up to Date – Security patches are
released for popular browsers all the time. They are released
in response to the security loopholes that phishers and
other hackers inevitably discover and exploit. If you
typically ignore messages about updating your browsers,
stop.
8. Be Wary of Pop-Ups – Pop-up windows often masquerade
as legitimate components of a website. All too often, though,
they are phishing attempts. Many popular browsers allow
you to block pop-ups; you can allow them on a case-by-case
basis.
9. Never Give Out Personal Information – As a general rule,
you should never share personal or financially sensitive
information over the Internet. This rule spans all the way
back to the days of America Online, when users had to be
warned constantly due to the success of early phishing
scams. If in doubt, go visit the main website of the company
in question, get their number and give them a call.

12
Conclusion
In conclusion, ethical hacking is an important practice in

the field of cybersecurity. Ethical hackers use their skills to

identify vulnerabilities in computer systems, networks, and

applications. They do this by attempting to hack into these

systems using the same techniques and tools that malicious

hackers use. However, unlike malicious hackers, ethical

hackers have permission to perform these activities and are

working to improve security rather than cause harm. Ethical

hacking is a technology career with specific skills, and

cybersecurity certifications help people break into the field.

13
Certificate and Internship
letter

14
15

You might also like