eti black and project
eti black and project
2025
Network
Hacking
Report
By: Prem Palhade,
Moreshwar Sargar
List of
Contents
Intro to Hack Sphere 1
Network Vulnerabilities 2
Wireless Attacks 3
OS Hacking 4
App-Level Threats 6
Database Vulnerabilities 8
Executive Summary
Hack
Sphere
This report focuses on
understanding how such attacks
happen and what steps can be taken
to prevent them. Each section
highlights real-world threats and
methods to reduce them.
Network
Vulnerabilities
Network vulnerabilities refer to weak points in the design, configuration,
or protection of a computer network. These flaws can be exploited to
intercept data, disrupt communication, or gain unauthorized access
.
Open Ports & Banner Grabbing – attackers scan for active ports and
gather info about running services to find potential targets.
Ping Sweeps & Port Scanning – tools used to detect live hosts and
services in a network, often as the first step in an attack.
Wireless
Attacks
1. Understanding Wireless Attacks
Wireless attacks target vulnerabilities in Wi-Fi networks, making it possible
for attackers to gain unauthorized access to data, monitor
communication, or even control connected devices. Unlike wired
networks, wireless signals travel through the air, which makes them more
exposed and easier to intercept. These attacks often take place in public
areas or poorly secured networks, where encryption is weak or
misconfigured.
Evil Twin Attack: Fake Wi-Fi created to trick users into connecting.
Packet Sniffing: Hackers capture unencrypted data sent over Wi-Fi.
Deauthentication Attack: Forces devices to disconnect and reconnect,
allowing data interception.
OS
Hacking
OS Hacking refers to exploiting vulnerabilities in operating systems like
Windows and Linux to gain unauthorized access or control. Hackers often
target outdated systems, weak passwords, or unpatched software.
Common attacks include privilege escalation, where attackers gain higher-
level access, and remote code execution,
Buffer &
Port Exploits
Buffer & Port Exploits involve techniques used by attackers to crash
systems, steal data, or take control of devices. A buffer overflow
happens when too much data is sent to a memory buffer, causing it to
overwrite nearby memory and possibly execute harmful code. This is a
common flaw in poorly written programs.
App-Level
Threats
Applications, whether desktop-based or mobile, are often targeted by
attackers due to their direct interaction with users and data. These
threats involve exploiting weaknesses in software to gain unauthorized
access or cause harm. Common application-level threats include:
These threats can lead to data leaks, financial loss, and reputational
damage. Regular updates, secure coding practices, and vulnerability
scanning tools help reduce the risk of these attacks.
Executive Summary
Web &
Email Risks
Web and email platforms are highly targeted due to their widespread use.
Web risks include vulnerabilities in websites and online applications, while
email threats often aim at tricking users into clicking harmful links or
giving away sensitive information.
Database
Vulnerabilities
Web and email platforms are highly targeted due to their widespread use.
Web risks include vulnerabilities in websites and online applications, while
email threats often aim at tricking users into clicking harmful links or
giving away sensitive information.
Thank
You
Thank you for taking the time to read this report.