JSPM’s
JAYWANTRAO SAWANT POLYTECHNIC
            DEPARTMENT OF COMPUTER
                      ENGINEERING
                    MICRO PROJECT
                    Academic year: 2023-24
                   TITLE OF PROJECT
    Describe Different Types of Hacking
Program: CO                          Program code:
CO6I Course:ETI                      Course code: 22618
Class: TYCO3
                      Submitted By:
                  1.NikitaPanchal
                  2. Nikita Avchar
                        Guided By:
                    Mrs.R.F.Shikhare
                DEPARTMENT OF
                      COMPUTER
                      ENGINEERING
                          MAHARASHTRA STATE
                    BOARD OF TECHNICAL EDUCATION
                                 Certificate
                             This is to certify that
Mr/Ms Nikita Panchal,Nikita Avchar Roll No:112,143of Semester Sixth of
Diploma in Computer Engineering of Institute, JS POLYTECHNIC (Code:0711)
has completed the Micro Project satisfactorily in Subject- Emerging Trends in
Computer and Information Technology (22618)for the academic year 2023-
2024 as prescribed in the curriculum.
       Place: Hadapsar, Pune                                Enrollment No:
                                                          2107110455
                                                          2207110678
      Date:                                                Exam Seat No:
  Subject Teacher             Head of the Department                 Principal
                       Acknowledgment
We would like to express our special thanks of gratitude to our subject teacher
Ms.S.R.Rajbhoj as well as our principal sir and HOD sir who gave us the golden
opportunity to do this wonderful Report on the topic Describe Different Types of
Hacking
of In which also helped us doing lot of Research and we came to know about so
many new things related to Emerging Trends in Computer and Information
Technology (22618) we are really thankful to them.
  JAYAWANTRAO SAWANT POLYTECHNIC,
     Handewadi Road, Hadapsar, Pune-
         28 Academic Year 2023-2024
                  INDEX
Sr No           contain               Page No
  1             Front page
  2              Certificate
  3           Acknowledgement
  4            Abstract
  5
                Introduction
                 to hacking
  6              Types of
                  hacking
                 There are
                three main
  7               types of
                  hacking
  8             Advantages
                    and
               disadvantage
                     s
                Conclusion
  9
                References
 10
                                                      Abstract
Chat application is a feature or a program on the Internet to communicate directly among Internet users who
are online or who were equally using the internet. Chat applications allow users to communicate even though from a
great distance. Therefore, this chat application must be real-time and multi-platform to be used by many users. The
development of information and communication technologies are rapidly making one of the reasons for Indonesia,
especially Bandung to develop this chat application. That's because Indonesia does not always rely on outsiders. It is
important for Indonesia to develop this chat application for themselves. This chat application in the manufacture
begins with the collection of relevant data that will be displayed in the web and mobile versions.
                                    INTRODUCTION
Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to
gain access to personal data or business data. An example of computer hacking can be: using a password
cracking algorithm to gain access to a computer system. Computers have become mandatory to run a
successful business. It is not enough to have isolated computers systems; they need to be networked
to facilitate communication with external businesses. This exposes them to the outside world and
hacking. System hacking means using computers to commit fraudulent acts such as fraud, privacy
invasion, stealing corporate/personal data, etc. Cybercrimes cost many organizations millions of dollars
every year. Businesses need to protect themselves against such attacks. Hacking refers to activities that
seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.
And while hacking might not always be for malicious purposes, nowadays most references to hacking, and
hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain,
protest, information gathering (spying), and even just for the “fun” of the challenge. A commonly used
hacking definition is the act of compromising digital devices and networks through unauthorized access to an
account or computer system. Hacking is not always a malicious act, but it is most commonly
associated with illegal activity and data theft by cyber criminals. Hacking in cyber security refers to the
misuse of devices like computers, smartphones, tablets, and networks to cause damage to or corrupt systems,
gather information on users, steal data and documents, or disrupt data-related activity. A traditional view of
hackers is a lone rogue programmer who is highly skilled in coding and modifying computer software and
hardware systems. But this narrow view does not cover the true technical nature of hacking. Hackers are
increasingly growing in sophistication, using stealthy attack methods designed to go completely
unnoticed by cybersecurity software and IT teams. They are also highly skilled in creating attack vectors that
trick users into opening malicious attachments or links and freely giving up their sensitive personal data.
ethical hacking is a process that helps improve the security of computer systems by identifying potential
weaknesses and vulnerabilities during their testing. It is done by professionals who have authorized access to
the computer and networks to report loopholes in the system of an organization to safeguard it from future
attacks or malicious users. Ethical hackers use the same techniques and tools that black hat hackers use
except that they have the authorization to report weak points in an organization’s network or computing
environment while protecting the security and privacy of that information
                                         Types of Hacking
 1) Phishing – In this type of hacking, hackers’ intention is to steal critical
 information of unlike account passwords, MasterCard detail, etc. For example,
   hackers can replicate an original website for users’ interaction and can steal
     critical information from the duplicate website the hacker has created.
2) Virus – These are triggered by the hacker into the filters of the website
  once they enter into it. The purpose is to corrupt the information or resources
                                on the net website.
3) UI redress – In this technique, the hacker creates a pretend interface and
  once the user clicks with the intent of progressing to a particular website,
                      they are directed to a special website.
4) Cookie theft – Hackers access the net website exploitation malicious
 codes and steal cookies that contain tips, login passwords, etc. Get access to
   your account then will do any factor besides your account. o Distributed
  Denial-of-service(DDoS) – This hacking technique is aimed toward taking
 down a website so that a user cannot access it or deliver their service. Gets the
 server down and stops it from responding, which may cause a condition error
                                   constantly.
5) DNS spoofing – This essentially uses the cache knowledge of an internet
   website or domain that the user might have forgotten keeping up to date. It
 then directs the data to a distinct malicious website. o Social Engineering –
   Social engineering is an attempt to manipulate you to share personal
            info, sometimes by impersonating a trustworthy supply.
6) Malware-Injection Devices – Cyber-criminals will use hardware to sneak
   malware onto your pc. You would have detected infected USB sticks which
  can allow hackers remote access to your device when it is connected to your
                                      pc.
    There are three main types of hacking
1) Black hat hackers
     Black hat hackers are cybercriminals that illegally crack systems with malicious intent. Seeking to gain
   unauthorized access to computer systems is the definition of black hat hacking. Once a black hat hacker finds a
   security vulnerability, they try to exploit it, often by implanting a virus or other type of malware such as a
   trojan. Ransomware attacks are another favoured ploy that black hat hackers use to extort financial gains or
   breach data systems.
2) White hat hackers
    White hat hackers are ethical security hackers who identify and fix vulnerabilities. Hacking into systems
  with the permission of the organizations they hack into, white hat hackers try to uncover system weaknesses in
  order to fix them and help strengthen a system’s overall security. Many cybersecurity leaders started out as
  white hat hackers, but the vital role played by ethical hacking is still widely misunderstood, as made clear
  by a recent ethical hacking case in Germany.
3) Gray hat hackers
    Gray hat hackers may not have the criminal or malicious intent of a black hat hacker, but they also don’t
  have the prior knowledge or consent of those whose systems they hack into. Nevertheless, when gray
  hat hackers uncover weaknesses such as zero-day vulnerabilities, they report them rather than fully exploiting
  them. But Gray hat hackers may demand payment in exchange for providing full details of what they
  uncovered
         t = Tiles(screen,
              tile_print_position[( i, j)][0],
              tile_print_position[(i, j)][1],
              tile_no[k], i, j)
     tiles.append(t)
    matrix[i][j] = tile_no[k]
    k += 1
check_mobility()
    check_mobility()
     # check if the tile can be places on
    the # required position where the
    # player is trying to move the
     tile def check_mobility():
for i in range(tile_count):
tile = tiles[i]
     row_index =
    tile.position_x col_index =
    tile.position_y
    adjacent_cells = []
    adjacent_cells.append([row_index-1, col_index, False]) # up
     adjacent_cells.append([row_index+1, col_index, False]) # down
     adjacent_cells.append([row_index, col_index-1, False]) # right
     adjacent_cells.append([row_index, col_index+1, False]) # left
     for i in range(len(adjacent_cells)):
if (adjacent_cells[i][0] >= 0 and adjacent_cells[i][0] < rows) and (adjacent_cells[i][1] >= 0 and adjacent_cells[i][1]
     < cols):
adjacent_cells[i][2] = True
for j in range(len(adjacent_cells)):
if adjacent_cells[j][2]:
adj_cell_row = adjacent_cells[j][0]
    adj_cell_col = adjacent_cells[j][1]
    for k in range(tile_count):
if adj_cell_row == tiles[k].position_x and adj_cell_col == tiles[k].position_y:
adjacent_cells[j][2] = False
alse_count =
for m in
range(len(adjacent_cells)): if
adjacent_cells[m][2]:
tile.movable = True
break
else:
false_count += 1
if false_count == 4:
tile.movable =
False
# if after iterating the matrix the
# string we get is 12345678_
then
# the player has won("Game
Over") def isGameOver():
global game_over, game_over_banner
allcelldata = ""
for i in range(rows):
for j in range(cols):
allcelldata = allcelldata + str(matrix[i][j])
if allcelldata == "12345678 ":
game_over = True
game_over_banner = "Game
Over" print("Game Over")
for i in range(tile_count):
tiles[i].movable        =
False tiles[i].selected =
False      #       Window
dimension
page_width, page_depth = pyautogui.size()
page_width = int(page_width * .95)
page_depth = int(page_depth * .95)
# tile dimensions
tiles = [1]
tile_width = 200
tile_depth = 200
# no of rows & column i.e puzzle
size rows, cols = (3, 3)
tile_count = rows * cols - 1 # how many tiles should be created
matrix = [["" for i in range(cols)] for j in range(rows)]
tile_no = []
tile_print_position = {(0, 0): (100, 50),
(0, 1): (305, 50),
(0, 2): (510, 50),
(1, 0): (100, 255),
(1, 1): (305, 255),
(1, 2): (510, 255),
(2, 0): (100, 460),
(2, 1): (305, 460),
(2, 2): (510, 460)}
# initial values of
variables mouse_press =
False
x_m_click, y_m_click = 0, 0
x_m_click_rel, y_m_click_rel = 0,
0 game_over = False
game_over_banner = ""
# initialize pygame and set the
caption pygame.init()
game_over_font = pygame.font.Font('freesansbold.ttf', 70)
move_count = 0
move_count_banner = "Moves : "
move_count_font = pygame.font.Font('freesansbold.ttf', 40)
screen = pygame.display.set_mode((page_width, page_depth))
pygame.display.set_caption("Slide Game")
font = pygame.font.Font('freesansbold.ttf', 200)
# creation of tiles in the
puzzle create_tyles()
running = True
while running:
screen.fill((0, 0, 0)) # fill with black color
# start drawing the gui board of sliding puzzle
pygame.draw.rect(screen, (165, 42, 42), pygame.Rect(95, 45, 620, 620))
game_over_print = game_over_font.render(
game_over_banner, True, (255, 255, 0))
# blit() will take that rectangular
Surface # and put it on top of the screen.
screen.blit(game_over_print, (950, 100))
# render the move_count with the use of
str if move_count == 0:
move_count_render =
move_count_font.render( move_count_banner,
True, (0, 255, 0))
else:
move_count_render = move_count_font.render(
move_count_banner + str(move_count), True, (0, 255, 0))
screen.blit(move_count_render, (1050, 200))
# Get events from the queue.
for event in pygame.event.get():
# if its quite operation then exit the while loop
if event.type == pygame.QUIT:
running = False
# if mouse click are detected then find (x,y)
# and then pass them to mouse_hover method
if event.type == pygame.MOUSEMOTION:
x_m_motion, y_m_motion = pygame.mouse.get_pos()
for i in range(tile_count):
tiles[i].mouse_hover(x_m_motion, y_m_motion)
# if the tile is selected & mouse is pressed
# then pass the coords to move_tyle
method for i in range(tile_count):
if tiles[i].selected and mouse_press: tiles[i].move_tyle(x_m_motion, y_m_motion)
# Moving tile downwards
if event.type == pygame.MOUSEBUTTONDOWN:
mouse_press = True
x_m_click, y_m_click = pygame.mouse.get_pos()
for i in range(tile_count):
 tiles[i].mouse_click(x_m_click, y_m_click)
# Moving tile upwards
if event.type == pygame.MOUSEBUTTONUP:
mouse_press = False
x_m_click_rel, y_m_click_rel = pygame.mouse.get_pos()
x_m_click, y_m_click = 0, 0
cell_found = False
for i in range(0, rows):
for j in range(0, cols):
tile_start_pos_x = tile_print_position[(i, j)][0]
tile_start_pos_y = tile_print_position[(i, j)][1]
 if (x_m_click_rel > tile_start_pos_x and x_m_click_rel < tile_start_pos_x + tile_width) and (y_m_click_rel >
tile_start_pos_y and y_m_click_rel < tile_start_pos_y + tile_depth):
if matrix[i][j] == "":
for k in range(tile_count):
 if game_over == False:
if tiles[k].selected:
if tiles[k].movable:
 cell_found = True
dummy = matrix[tiles[k].position_x][tiles[k].position_y]
matrix[tiles[k].position_x][tiles[k].position_y] = matrix[i][j]
matrix[i][j] = dummy
tiles[k].position_x = i
tiles[k].position_y = j
tiles[k].start_pos_x = tile_print_position[(
i, j)][0]
tiles[k].start_pos_y =
 tile_print_position[( i, j)][1]
 move_count += 1
isGameOver()
 check_mobility()
 if cell_found == False:
for k in range(tile_count):
if tiles[k].selected:
mat_pos_x = tiles[k].position_x
mat_pos_y = tiles[k].position_y
 tiles[k].start_pos_x =
 tile_print_position[( mat_pos_x,
 mat_pos_y)][0]
tiles[k].start_pos_y = tile_print_position[(
mat_pos_x, mat_pos_y)][1]
 brack
for i in range(tile_count):
tiles[i].draw_tyle()
# allows only a portion of the screen to updated,
# instead of the entire area,
# If no argument is passed it
 # updates the entire Surface area like pygame.
 pygame.display.flip()
# Update the whole
screen
pygame.display.update()
Output
                                        Conclusion
A two Player Puzzle game , which we can play on the command line. Python is generally utilized for
creating websites and software , task automation , data analysis , and data visualization
                            JSPM’s
                JAYWANTRAO SAWANT POLYTECHNIC
                          DEPARTMENT OF COMPUTER
                                        ENGINEERING
Aim/Benefits Of The Micro Project
– Solving puzzles helps to enhance the connections that already exist between our brain cells. It also boosts
the number of new relationships formed. As a result, mental quickness and cognitive processes improve.
Course Outcomes Achieved:
    a.   Develop group discussion skills
    b.   Communication skills Improved
    c.   MS Word Skills developed
    d.   Data collection skills
    e.   Python 3 programming skills
Action Plan:
Sr.        Details of activity                   Planned               Planned             Name of
No                                              start date            Finish date          Responsible
                                                                                           Team
                                                                                           members
  1        Introduction                      10th March             14th March
  2        Design Of The Project             13th March             20th March           1. Ankita A
  3         Understand Of The                15th March              24th March          Mane
                 Project
  4                                          24th March              27th March          2. Rohan D
           Finally Running The
                                                                                         Shinde
                   Code
  5                Output                    28th March              30th March
                                                                                         3. Yash D
                                              30th Marh              31th March             Vibhute
                                                                                         4. Akib k Khan
  6              Conclusion
Actual Resources Used:
Sr.      Name of resource /
No.               material Specification   Quantity   Remarks
 1.          PC             Intel i7            1
                            vPro,8GB
                                RAM
 2.       Python IDE          Windows           -
                               /Linux
                                  JSPM’s
                     JAYAWANTRAO SAWANT POLYTECHNIC,
                      Handewadi Road, Hadapsar, Pune-28
                                  Department of Computer
                       Engineering Academic Year 2023-24
                                   Teacher Evaluation Sheet
Nameofstudent:NikitaPanchaEnrollm
enNo: 2107110455
    Name of program: Computer Engineering                    Semester: Sixth
    CourseTitle: Programming With Python                             Code: 22616
    Title of Micro Project: Develop Application For Puzzle Game In Python
    Evaluation as per suggested Rubric for Assessment of Micro
     Sr.   Characteristic to be            Poor         Average        Good        Excellent
    Project
     No assessed                        (Marks1- 3)   (Marks 4 -5)   (Marks 6   (Marks 9 -
                                                                     8)         10)
      1    Relevance to the course
      2    Literature Survey /
           Information collection
      3    Project Proposal
      4    Completion of the Target
           as per Project Proposal
      5    Analysis of data and
           representation
      6    Quality of Prototype/
           Model
      7    Report preparation
      8    Presentation
      9    Defense
                           Micro Project Evaluation Sheet
     Process Assessment                    Product Assessment                Total
                                                                             Marks
Part A -         Project     Par B - Project              Individual
Project          Methodology Report/ working             Presentation/        10
Proposal                     Model
                  (2 Marks)                             Viva (4 Marks)
  (2 Marks)                       (2 Marks)
Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column
Name and Designation of the Faculty Member: Mrs.R.F.Shikhare
Signature: ………………………….
                                         JSPM’s
               JAYAWANTRAO SAWANT POLYTECHNIC,
                  Handewadi Road, Hadapsar, Pune-28
                              Department of Computer
                   Engineering Academic Year 2023-24
                               Teacher Evaluation Sheet
Name of student: Nikita AvcharEnrollment No: 2207110678
Name of program: Computer Engineering         Semester: Sixth
CourseTitle: Programming With Python                             Code: 22616
Title of Micro Project: Develop Application For Puzzle Game In Python
Evaluation as per suggested Rubric for Assessment of Micro
 Sr.   Characteristic to be            Poor         Average        Good        Excellent
Project
 No assessed                        (Marks1- 3)   (Marks 4 -5)   (Marks 6   (Marks 9 -
                                                                 8)         10)
  1    Relevance to the course
  2    Literature Survey /
       Information collection
  3    Project Proposal
  4    Completion of the Target
       as per Project Proposal
  5    Analysis of data and
       representation
  6    Quality of Prototype/
       Model
  7    Report preparation
  8   Presentation
  9   Defense
                           Micro Project Evaluation Sheet
      Process Assessment                   Product Assessment                Total
                                                                             Marks
Part A -         Project     Par B - Project              Individual
Project          Methodology Report/ working             Presentation/        10
Proposal          (2 Marks)  Model
                                                        Viva (4 Marks)
  (2 Marks)                       (2 Marks)
Note: Every course teacher is expected to assign marks for group evaluation in first 3
columns and individual evaluation 4th column
Name and Designation of the Faculty Member: Mrs.R.F.Shikhare
Signature: ………………………….
………….