MICRO-PROJECT ON
“Types Of AI”
Submitted: 2024-2025
Under the guidance of
Prof. M.U. Mun Mam
( Lecturer in Computer Technology)
This Micro-project work submitted in partial fulfilment of requirement
for the award of Diploma in Computer Technology for subject
Submitted By:
Enrollment
Name No. Roll No.
Kajal N.Bhoyar 2201210115 14
Government Polytechnic, Bramhapuri
Department of Computer Technology
This is to certify that the following student of this institute have carried
out this micro- project work on “Network Hacking”under the
guidance of Prof. M.U. Mun Mam in the Department of Computer
Technology during the session 2024-25. This work has been done in
the partial fulfilment of the award for in Diploma in Computer
Technology from Maharashtra State Board of Technical Education,
Mumbai.
SUBMITTED-BY
Enrollment
Name No. Roll No.
Kajal N.Bhoyar 2201210115 14
Project Guide Head of Department
Prof M.U.Mun Mam Prof. S. K. Kharkate. Mam
Part A:
Micro-Project Proposal
1. Brief Description
Network hacking refers to the act of gain unauthorized access to a
computer network and its infrastructure resources, such as devices,
servers,software, and other services. Network hacking involves gathering
information about a target network, identifying vulnerabilities, and
exploiting them to gain access. A variety of tools and techniques are used
to identify potential security threats in computer networks. Network
Hacking is gathering an information from network and computers over the
internet.
2. Aim of Micro-Project
“ report On Network Hacking”
3. Intended Course Outcome
Describe Network Infrastructure Vulnerabilities
Describe Messaging Systems
Project Management Skills
4. Literature Review
This chapter discusses the literatures drawn from studies carried out
previously. The references considered for literature analysis include
articles, journals and books on Network Hacking, etc.This chapter will
provide an overview of network hacking.
Link:- https://www.ijnrd.org/papers/IJNRD2407491.pdf
This website provides the information about Network Hacking etc..
5. Proposed Methodology:
• This is micro project will be created to prepare a report network hacking
• In order to create this report, I will study research paper related to network
hacking.
• Initially the brief introduction about the topic will be written.
• Then the details about network hacking will be described.
• Then the impacts of network hacking will be explain in details.
6. Resource Required
Sr No. Resource Used Specification Quantity
1. Web Browser Google Chrome -
2. Laptop 1
HP RAM, 512 SSD, AMD
RYZEN
3. Book Technical Publication 1
7. Action Plan
Sr No. Detail of Activity Start Date End Date Name of Student
1. Discuss about the topic
2. Information search from
various sources.
Kajal bhoyar
3. Discuss with project guide
4. Implement part-A
5. Implement part-B
6. Final Report
7.
Submission of final
report
Part B
“Business Plan on Web Development Services”
1. Rational:
Network hacking refers to the act of gain unauthorized access to a
computer network Network hacking involves gathering information
about a target network, identifying vulnerabilities, and exploiting them to
gain access. A variety of tools and techniques are used to identify
potential security threats in computer networks. Network Hacking is
gathering an information from network and computers over the internet
2. Aim of Micro-Project
Business Plan on Web Development Services
3. Course Outcomes
• Describe Network Infrastructure Vulnerabilities
• Describe Messaging Systems
• Project Management Skills .
4. Literature Review
This chapter discusses the literatures drawn from studies carried out
previously. The references considered for literature analysis include
articles, journals and books on Network Hacking, etc.This chapter will
provide an overview of network hacking.
Link:- https://www.ijnrd.org/papers/IJNRD2407491.pdf
This website provides the information about Network Hacking etc..
5. Actual Methodology Followed
1.In this microproject I studied the information related to the Network Hacking
2.Initially the introduction about Network Hacking
3.Then I explain the details about Network Hacking.
Information:-
1) Network Infrastructure :-
To have secure operating systems and applications, you need a secure network.
Devices such as routers, firewalls, and even generic network hosts (including
servers and workstations) must be assessed as part of the security testing process.
There are thousands of possible network vulnerabilities, equally as many tools, and
even more testing techniques. You probably don't have the time or resources
available to test your network infrastructure systems for all possible vulnerabilities,
using every tool and method imaginable. Instead, you need to focus on tests that
will produce a good overall assessment of your network and the tests I describe in
this chapter produce exactly that.
You can eliminate many well-known, network-related vulnerabilities by simply
patching your network hosts with the latest vendor software and firmware updates.
2).Network Infrastructure Vulnerabilities: -
Network infrastructure vulnerabilities are the foundation for most technical security
issues in your information systems.
These lower-level vulnerabilities affect practically everything running on your
network. That's why you need to test for them and eliminate them whenever
possible.
Your focus for security tests on your network infrastructure should be to find
weaknesses that others can see in your network so you can quantify and treat your
network's level of exposure.
3) Scanning-Ports: -
A port scanner shows you what's what on your network by scanning the network to
see what's alive and working. Port scanners provide basic views of how the network
is laid out. They can help identify unauthorized hosts or applications and network
host configuration errors that can cause serious security vulnerabilities. The
bigpicture view from port scanners often uncovers security issues that might
otherwise go unnoticed. Port scanners are easy to use and can test network hosts
regardless of what operating systems and applications they're running.
Market -
The web development market can be broadly categorized based on
If your results don't match after you run the tests using different tools, you might
want to explore the issue further. If something doesn't look right such as a strange
set of open ports it probably isn't. Test again; if you’re in doubt, use another tool
for a different perspective.
4) Scanning SNMP: -
Simple Network Management Protocol (SNMP) is built in to virtually every
network device. Network management programs (such as HP Open View and
LANDesk) use SNMP for remote network host management. Unfortunately. SNMP
also presents security vulnerabilities.
1.Vulnerabilities
The problem is that most network hosts run SNMP enabled with the default
read/write community strings of public/private. The majority of network devices I
come across have SNMP enabled and don't even need it.
2. Countermeasures against SNMP attacks
Preventing SNMP attacks can be as simple as A-B-C:
o Always disable SNMP on hosts if you're not using it period... o Block
the SNMP o Change the default SNMP community read string from
public and the default community write string from private to another long
and complex value that's virtually impossible to guess
5) MAC daddy Attack
Attackers can use ARP (Address Resolution Protocol)- running on your network to
make their systems appear as your system or another authorized host on your
network.
1. ARP spoofing:
An excessive number of ARP requests can be a sign of an ARP spoofing attack (also
called ARP poisoning) on your network.
Register your business with the relevant government authorities at the state,
county, or city level. You might need to obtain specific business licenses, permits,
and certifications depending on your location and the services you offer. Research
your local requirements to ensure legal compliance. Cain and Abel
(www.oxid.it/cain.html), can change the ARP tables- the tables that store IP
addresses to media access control (MAC) address mappings on network hosts.
This causes the victim computers to think they need to send traffic to the
attacker's computer rather than to the true destination computer when
communicating on the network.
6. Resources Used
Sr.No. Resource Used Specification Quantity
1. Web Browser Google Chrome -
2. Laptop HP AMD RYZEN 16gb RAM, 1
512 SSD,
3. Book Emerging trends 1
7. Skill Developed:
• Problem solving approach
• Planning
• Design skill
• Logical skill
• Programming
• Testing and Troubleshooting
•
8.Conclusion
The microproject t titled “Network Hacking” explores the real authorized access to
computer networks, emphasizing the importance of understanding and mitigating
the risks associated with network security. The project delves into network
infrastructure vulnerabilities, various hacking techniques, and tools employed in
the process.