100% found this document useful (3 votes)
2K views28 pages

Email Hacking

The document summarizes an email hacking project done by students. The project involved developing a fake webpage to trick users into entering their email login credentials. The fake webpage would store the entered credentials in a database, allowing the email hacker to access the user's inbox. The project addressed hardware and software requirements and included class, use case, sequence, collaboration, and activity diagrams to design the phishing scheme.

Uploaded by

Haritha Donthula
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
2K views28 pages

Email Hacking

The document summarizes an email hacking project done by students. The project involved developing a fake webpage to trick users into entering their email login credentials. The fake webpage would store the entered credentials in a database, allowing the email hacker to access the user's inbox. The project addressed hardware and software requirements and included class, use case, sequence, collaboration, and activity diagrams to design the phishing scheme.

Uploaded by

Haritha Donthula
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

EMAIL HACKING

BY

BATCH-03

D.HARITHA D.KEERTHI K.HEMALATHA B.SREELATHA

08871A1228 08871A1231 08871A1244 08871A1212

PROJECT GUIDE: N.RAJENDER

PROJECT CO-ORDINATOR: D.RAJASHEKAR

ABSTRACT
Email Hacking is nothing but to hack the userid and password of the email user.
There are several methods for hacking yahoo, msn or AOL email accounts. One of these methods is social engineering. Social engineering consists in the ability to trick someone in believing that he is giving information to someone who has the authority to ask for it. Email Hacking is used to hack the userid and password of the email user by developing a fake webpage which looks same as the original webpage. The user enters the details in the fake web form then the details will be stored in the database .Then by using the details of the user stored in database the email hacker will enter the user mail inbox by entering the userid and password, then he can do any malicious functions.

REQUIREMENT SPECIFICATIONS
Hardware Requirement Specifications(HRS)

Processor
RAM

Pentium III/IV/Dual Core/Core 2 Duo


100GB

Hard Disk

128MB or above

Software Requirement Specifications(SRS)

Operating System Technology Language Data Base Browser Server

Windows XP, Windows 7 .NET Framework ASP.NET SqlServer 2005 Any web browser IE, Firefox etc. Internet Information Services(IIS)

LITERATURE SURVEY

Existing system:
There are different techniques for E-Mail Hacking. Those are

1. Phishing
2. Keystroke Capturing

a. Hardware Keylogger
b. Software Keylogger 3. Password Guessing.

Proposed System:
In this proposed system we are going to simulate the Phishing in very effective way that the user can fall into the hacking net very easily. Because we will hack the email by fake form. We use different fake forms it means we will not use same forms for hacking the email.

SOFTWARE REQUIREMENT SPECIFICATION


1. INTRODUCTION 1.1 Purpose 1.2 Scope 1.3 Definations , Acronyms and Abbrevations 1.4 References

2. The Overall Description


2.1 Product Perspective

2.1.1 Hardware Interfaces


2.1.2 Software Interfaces

2.1.3 Communications Interfaces


2.2 Product Functions

2.3 User Characteristics


2.4 Constraints

3. Specific Requirements 3.1 External interface 3.2 Performance Requirements Availability 3.3 Logical Database Requirements 3.4 Design Constraints 3.4.1 Standards Compliance

3.5 Software System Attributes

3.5.1Maintainability
3.5.2 Portability

DESIGNING PHASE
Login +UserId +Password +Login() +Clear() Accountarea

New User +FirstName +LastName +DOB +Gender +UserId +Password +ConfirmPassword +Country +Nationality +EmailId +Submit() +Cancel() +Back()

Inbox +frommail +datetime +subject +staus +readmail()

Compose +tomail +subject +attachfile +mail +senmail() +savemail() +discard()

Sent Items +tomail +datetime +subject +status +readsentmail() +resentmail()

Drafts +tomail +datetime +subject +status +readsavedmail() +sendmail()

setting +Current Password +new password +re enter password +submit()

Fig: Class Diagram For user

Visit Home page

Login page

Account Area page

Reads Mails from inbox Existing User

Compose Mail

Sends & Save Mails

Logout

Fig: Usecase Diagram for Existing User

Visit Home page

Login page

New User Registration

Account Area page

New User Reads Mails from inbox

Compose Mail

Sends & Save Mails

Logout

Fig: Usecase Diagram for New User

Existing User

Visit Home Page

Login Page

Accountarea Page

Reads mails from Inbox

Compose mail

Send & Save mail

Logout

Visits home page

Enters login page

Enters into Accountarea page

Reads mails from Inbox

Compose mail

Sends and save mails

Logouts from the current page

Fig: Sequence Diagram For Existing User

Existing User

Visit Home Page

Login Page

New user Registration

Accountarea Page

Reads mails from Inbox

Compose mail

Send & Save mail

Logout

Visits home page

Enters login page

Register for New Userid

Enters into Accountarea page

Reads mails from Inbox

Compose mail

Sends and save mails

Logouts from the current page

Fig: Sequence Diagram for New User

1: Existing User

2: Visit Home Page Login Page

4: 3:

6:

AccountareaReads mails fromSend & Sav e 7: 5: Page Inbox mail

Compose mail

Logout

Fig: Collaboration Diagram for Existing User

1: Existing User

2: Visit Home Page

3: Login Page New user Registration

5: 4:

7:

AccountareaReads mails fromSend & Save 8: 6: Page Inbox mail

Compose mail

Logout

Fig: Collaboration Diagram For New User

Home page

login page

sign up

Enter userid and password

Account page

inbox

compose

sent

drafts

settings

logout

Fig: Activity Diagram for user

LEVEL-0

Fig: DataFlow Diagram

IMPLEMENTATION
Home Module

Login Module
Registration Module

Account Module

Home Page: Here User clicks on xmail to go to his account.

User login: This is login form for user.

User Registration: Registers here for new user account.

User Account: User reads mails, save mails, sends mails, compose mails, change password in there account

You might also like