0% found this document useful (0 votes)
7 views13 pages

Micro-Project On: "Types of AI"

The micro-project titled 'Network Hacking' explores unauthorized access to computer networks, focusing on vulnerabilities and security threats. It aims to provide a comprehensive report on network hacking, detailing methodologies, literature reviews, and the impact of hacking techniques. The project is submitted by Kajal N. Bhoyar under the guidance of Prof. M.U. Mun Mam as part of the Diploma in Computer Technology program.

Uploaded by

twinklehatwar884
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views13 pages

Micro-Project On: "Types of AI"

The micro-project titled 'Network Hacking' explores unauthorized access to computer networks, focusing on vulnerabilities and security threats. It aims to provide a comprehensive report on network hacking, detailing methodologies, literature reviews, and the impact of hacking techniques. The project is submitted by Kajal N. Bhoyar under the guidance of Prof. M.U. Mun Mam as part of the Diploma in Computer Technology program.

Uploaded by

twinklehatwar884
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

MICRO-PROJECT ON

“Types Of AI”

Submitted: 2024-2025

Under the guidance of

Prof. M.U. Mun Mam


( Lecturer in Computer Technology)

This Micro-project work submitted in partial fulfilment of requirement


for the award of Diploma in Computer Technology for subject

Submitted By:

Enrollment
Name No. Roll No.
Kajal N.Bhoyar 2201210115 14

Government Polytechnic, Bramhapuri


Department of Computer Technology

This is to certify that the following student of this institute have carried
out this micro- project work on “Network Hacking”under the
guidance of Prof. M.U. Mun Mam in the Department of Computer
Technology during the session 2024-25. This work has been done in
the partial fulfilment of the award for in Diploma in Computer
Technology from Maharashtra State Board of Technical Education,
Mumbai.

SUBMITTED-BY

Enrollment
Name No. Roll No.
Kajal N.Bhoyar 2201210115 14

Project Guide Head of Department

Prof M.U.Mun Mam Prof. S. K. Kharkate. Mam

Part A:
Micro-Project Proposal
1. Brief Description
Network hacking refers to the act of gain unauthorized access to a
computer network and its infrastructure resources, such as devices,
servers,software, and other services. Network hacking involves gathering
information about a target network, identifying vulnerabilities, and
exploiting them to gain access. A variety of tools and techniques are used
to identify potential security threats in computer networks. Network
Hacking is gathering an information from network and computers over the
internet.

2. Aim of Micro-Project
“ report On Network Hacking”

3. Intended Course Outcome

 Describe Network Infrastructure Vulnerabilities


 Describe Messaging Systems
 Project Management Skills

4. Literature Review

This chapter discusses the literatures drawn from studies carried out
previously. The references considered for literature analysis include
articles, journals and books on Network Hacking, etc.This chapter will
provide an overview of network hacking.

Link:- https://www.ijnrd.org/papers/IJNRD2407491.pdf
This website provides the information about Network Hacking etc..

5. Proposed Methodology:

• This is micro project will be created to prepare a report network hacking


• In order to create this report, I will study research paper related to network
hacking.

• Initially the brief introduction about the topic will be written.

• Then the details about network hacking will be described.


• Then the impacts of network hacking will be explain in details.

6. Resource Required
Sr No. Resource Used Specification Quantity

1. Web Browser Google Chrome -

2. Laptop 1

HP RAM, 512 SSD, AMD


RYZEN

3. Book Technical Publication 1

7. Action Plan

Sr No. Detail of Activity Start Date End Date Name of Student

1. Discuss about the topic

2. Information search from


various sources.
Kajal bhoyar
3. Discuss with project guide

4. Implement part-A

5. Implement part-B

6. Final Report

7.
Submission of final
report

Part B
“Business Plan on Web Development Services”

1. Rational:
Network hacking refers to the act of gain unauthorized access to a
computer network Network hacking involves gathering information
about a target network, identifying vulnerabilities, and exploiting them to
gain access. A variety of tools and techniques are used to identify
potential security threats in computer networks. Network Hacking is
gathering an information from network and computers over the internet

2. Aim of Micro-Project
Business Plan on Web Development Services

3. Course Outcomes

• Describe Network Infrastructure Vulnerabilities


• Describe Messaging Systems
• Project Management Skills .

4. Literature Review

This chapter discusses the literatures drawn from studies carried out
previously. The references considered for literature analysis include
articles, journals and books on Network Hacking, etc.This chapter will
provide an overview of network hacking.

Link:- https://www.ijnrd.org/papers/IJNRD2407491.pdf

This website provides the information about Network Hacking etc..

5. Actual Methodology Followed

1.In this microproject I studied the information related to the Network Hacking
2.Initially the introduction about Network Hacking

3.Then I explain the details about Network Hacking.

Information:-

1) Network Infrastructure :-
To have secure operating systems and applications, you need a secure network.
Devices such as routers, firewalls, and even generic network hosts (including
servers and workstations) must be assessed as part of the security testing process.

There are thousands of possible network vulnerabilities, equally as many tools, and
even more testing techniques. You probably don't have the time or resources
available to test your network infrastructure systems for all possible vulnerabilities,
using every tool and method imaginable. Instead, you need to focus on tests that
will produce a good overall assessment of your network and the tests I describe in
this chapter produce exactly that.

You can eliminate many well-known, network-related vulnerabilities by simply


patching your network hosts with the latest vendor software and firmware updates.
2).Network Infrastructure Vulnerabilities: -
Network infrastructure vulnerabilities are the foundation for most technical security
issues in your information systems.
These lower-level vulnerabilities affect practically everything running on your
network. That's why you need to test for them and eliminate them whenever
possible.
Your focus for security tests on your network infrastructure should be to find
weaknesses that others can see in your network so you can quantify and treat your
network's level of exposure.

3) Scanning-Ports: -
A port scanner shows you what's what on your network by scanning the network to
see what's alive and working. Port scanners provide basic views of how the network
is laid out. They can help identify unauthorized hosts or applications and network
host configuration errors that can cause serious security vulnerabilities. The
bigpicture view from port scanners often uncovers security issues that might
otherwise go unnoticed. Port scanners are easy to use and can test network hosts
regardless of what operating systems and applications they're running.

Market -
The web development market can be broadly categorized based on

If your results don't match after you run the tests using different tools, you might
want to explore the issue further. If something doesn't look right such as a strange
set of open ports it probably isn't. Test again; if you’re in doubt, use another tool
for a different perspective.

4) Scanning SNMP: -
Simple Network Management Protocol (SNMP) is built in to virtually every
network device. Network management programs (such as HP Open View and
LANDesk) use SNMP for remote network host management. Unfortunately. SNMP
also presents security vulnerabilities.

1.Vulnerabilities
The problem is that most network hosts run SNMP enabled with the default
read/write community strings of public/private. The majority of network devices I
come across have SNMP enabled and don't even need it.

2. Countermeasures against SNMP attacks


Preventing SNMP attacks can be as simple as A-B-C:
o Always disable SNMP on hosts if you're not using it period... o Block

the SNMP o Change the default SNMP community read string from
public and the default community write string from private to another long

and complex value that's virtually impossible to guess

5) MAC daddy Attack


Attackers can use ARP (Address Resolution Protocol)- running on your network to
make their systems appear as your system or another authorized host on your
network.

1. ARP spoofing:
An excessive number of ARP requests can be a sign of an ARP spoofing attack (also
called ARP poisoning) on your network.

Register your business with the relevant government authorities at the state,
county, or city level. You might need to obtain specific business licenses, permits,
and certifications depending on your location and the services you offer. Research
your local requirements to ensure legal compliance. Cain and Abel
(www.oxid.it/cain.html), can change the ARP tables- the tables that store IP
addresses to media access control (MAC) address mappings on network hosts.
This causes the victim computers to think they need to send traffic to the
attacker's computer rather than to the true destination computer when
communicating on the network.
6. Resources Used

Sr.No. Resource Used Specification Quantity

1. Web Browser Google Chrome -

2. Laptop HP AMD RYZEN 16gb RAM, 1

512 SSD,

3. Book Emerging trends 1

7. Skill Developed:

• Problem solving approach


• Planning
• Design skill
• Logical skill
• Programming
• Testing and Troubleshooting

8.Conclusion
The microproject t titled “Network Hacking” explores the real authorized access to
computer networks, emphasizing the importance of understanding and mitigating
the risks associated with network security. The project delves into network
infrastructure vulnerabilities, various hacking techniques, and tools employed in
the process.

You might also like