0% found this document useful (0 votes)
88 views17 pages

ETI Project

The micro project titled 'Network Hacking' submitted by students from Government Polytechnic Malvan focuses on unauthorized access to computer networks, highlighting the importance of understanding and mitigating associated risks. It covers network vulnerabilities, hacking techniques, and tools, while also detailing the methodology and skills developed during the project. The project aims to educate individuals and organizations on the significance of implementing security measures to protect their networks and data.

Uploaded by

bhushanjadhav117
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views17 pages

ETI Project

The micro project titled 'Network Hacking' submitted by students from Government Polytechnic Malvan focuses on unauthorized access to computer networks, highlighting the importance of understanding and mitigating associated risks. It covers network vulnerabilities, hacking techniques, and tools, while also detailing the methodology and skills developed during the project. The project aims to educate individuals and organizations on the significance of implementing security measures to protect their networks and data.

Uploaded by

bhushanjadhav117
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

A

Micro Project On

R
“NETWORK HACKING”

GOVERNMENT POLYTECHNIC MALVAN

Diploma in Computer engineering

Malvan

(2024-2025)

1|Page
A PROJECT REPORTED ON

"
"NETWORK HACKING”
Submitted to
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION, MUMBAI. By
the students of Third Year Diploma in “Computer Engineering‟

3256 Aniket Suresh Renushe.


.
3270 Ajay Lalsing Jadhav.
3271 Bhushan Shravan Jadhav .

Mahadik Mam Prof – T.V.Mitke Mam


Mam
(Guide) (H.O.D)

2|Page
GOVERNMENT POLYTECHNIC MALVAN

2024-2025

CERTIFICATE
This is to certify that, the micro project title
“NETWORK HACKING”
Is being submitted by,

NAME Enrollment NO.

1. Aniket Suresh Renushe 2201170306

2. Ajay Lalsing Jadhav 23110230186


3. Bhushan Shravan Jadhav 23110230187

Above students has successfully completed the micro project work in subject
MAN (22509) during the sixth semester academic year 2024-2025 for the partial
fulfillment of Third year diploma in ELECTRONICS & COMMUNICATION
ENGINEERING under supervision and guidance.

GUIDE HOD
Ms.Mahadik Mam Prof.T.V.Mitake Mam
** NETWORK HACKING **

INDEX

Sr. Content Page No.


No
1 Rationale 5
2 Aim of the microproject 5
3 Course Outcomes 6
4 Literature review 6
5 Actual Methodology Followed 6
6 Actual Resources Used 7
7 Entire info of the micro project 8 to 22
8 Skills Developed 23
9 Applications 23
10 Conclusion & References 24
1.0 Rationale

Network hacking refers to the act of gaining unauthorized access to a computer


network and its infrastructure resources, such as devices, servers, software, and
other services. Network hacking involves gathering information about a target
network, identifying vulnerabilities, and exploiting them to gain access. A variety of
tools and techniques used to identify potential security threatsin computer networks.

Network Hacking is gathering an information from network and computers over the
internet.

2.0 Aims and benefits of the micro project:

Network hacking is a serious hreat to computer networks and


systems. It is important for individual sand organizations to
understand the risks

and implement appropriate security measures to prevent


unauthorized access to their networks and data.
3.0 Course outcomes achieved: -

➤ Describe Network Infrastructure Vulnerabilities

➤ Describe Messaging Systems

➤ Project Management Skills

➤Creativity and Innovation

4.0 Literature review: -

The Explosive growth of the Internet has brought many good


things such as E-commerce-banking, E-mail, cloud computing,
but there is also a dark side such as Hacking, Backdoors,
Trapdoors etc. Hacking is the first big problem faced by
Governments, companies, and private citizens around the world.
Hacking means reading emails of someone, stealing passwords,
stealing credit card numbers etc. An ethical hacker is one who
can help the people who are suffered by these hackings. This
project describes about Network hackers, it's types and phases of
hacking.
5.0 Actual Methodology followed: -

• First, I thinkabout topic and then decided the topic of project.

• Did some research on the selected topic.

• We focused on the materials we needed, as well as gathered


information about Networking hacking and its tools.

• Collecting some pictures about network hacking for describing


much better and easily.

• Prepared a report and Checked for any further changes to be


done in the project.
Sr. Name of Specifications Quantit Remark
No Resources/materi y s
. al

Book Emerging Trends in 01 -


Information and
1 Technology

2 Book Network Hacking 01 -


Author

3 Website 01 -

https://www.network
en

Information:

1) Network Infrastructure:

To have secure operating systems and applications, you need a


secure network. Devices such as routers, firewalls, and even
generic network hosts (including servers and workstations) must
be assessed as part of the security testing process.

There are thousands of possible network vulnerabilities, equally


as many tools, and even more testing techniques. You probably
don't have the time or resources available to test your network
infrastructure systems for all possible vulnerabilities, using every
tool and method imaginable. Instead, you need to focus on tests
that will produce a good overall assessment of your network and
the tests I describe in this chapter produce exactly that.

You can eliminate many well-known, network-related


vulnerabilities by simply patching your network hosts with the
latest vendor software
Network Infrastructure Vulnerabilities: -

Network infrastructure vulnerabilities are the foundation for most


technical security issues in your information systems.

These lower-level vulnerabilities affect practically everything


running on your network. That's why you need to test for them
and eliminate them whenever possible.
Your focus for security tests on your network infrastructure
should be to find weaknesses that others can see in your network
so you can quantify and treat your network's level of exposure

Scanning-Ports:-

A port scanner shows you what's what on your network by


scanning the network to see what's alive and working. Port
scanners provide basic views of how the network is laid out.
They can help identify unauthorized hosts or applications and
network host configuration errors that can cause serious security
vulnerabilities.

The big-picture view from port scanners often uncovers security


issues that might otherwise go unnoticed. Port scanners are easy
to use and can test network hosts regardless of what operating
systems and applications they're running. The tests are usually
performed relatively quickly without having to touch individual
network hosts, which would be a real pain otherwise.
The trick to assessing your overall network security is interpreting the
results you get from a port scan. You can get false positives on open
ports, and you might have to dig deeper. For example, User Datagram
Protocol (UDP) scans like the protocol itself are less reliable than
Transmission Control Protocol (TCP) scans and often produce false
positives because many applications don't know how to respond to
random incoming UDP requests.

your results don't match after you run the tests using different tools, you
might want to explore the issue further. If something doesn't look right
such as a strange set of open ports it probably isn't. Test again; if you're in
doubt, use another tool for a different perspective.
Port No Service Protocols

7 Echo UDP

19 Chargen Chargen

20 FTP data (File Transfer TCP


Protocol)

22 SSH TCP

Ping Sweep: -

What is Ping Sweep?

The IP address has many functionalities. Ping sweep is a


term related to it. Scanning ping is one of the most
efficient ways to find network vulnerabilities and tackle
network-related discoveries. It also saves lots of time
because the procedure related to ping sweep is pretty
simple. Pinging a simple service similar to google.com
gives back many results and we can learn our situation
depending on the result we get back. Pinging a
network or system allows us to determine if a host is
alive or dead. This network-based utility can ping one

Purpose of Ping Sweep

Ping sweep is used to gain various information over the host. It has the
potential to address a range of IPs for live mapping. In regular pinging,
we have echo request and echo-response functions. It's a way of data
request and gaining sufficient knowledge on a network device. It can
also map a range of IPs. Echo request reveals information regarding
the IP we ping. Local pinging directs via local DNS server and input has
a round-trip time (RTT). But ping sweep uses ICMP echo request. It can
send packets of data to reveal in-depth information about a host or
range of hosts. Finding out live and dead Ips, detecting bad traffic and
rogue network devices, and matching only permitted IPs on the
network are a few results that can be documented by ping sweeping.
Regular pinging can be done on console command on admin devices
but ICMP echoing requires advanced software packages. Same reason
they can be manipulated away the admin wants to achieve live
mapping a DHCP environment
7.0 Skill developed: -

❖ Problem solving approach

❖ Planning

❖ Design skill

❖ Logical skill

❖ Programming

❖ Testing and Troubleshooting


❖ Presentation

❖ Report writing

❖ Analysing the problem

9.0 Applications of the Micro-Project: -

Network hacking is a serious threat to computer networks and


systems. It is important for individuals and organizations to
understand the risks and implement appropriate security
measures to prevent unauthorized access to their networks
and data.

10.0 Conclusion:

The micro-project titled "Network Hacking" explores the realm o


unauthorized access to computer networks, emphasizing the
importance of understanding and mitigating the risks
associated with network security. The project delves into
network infrastructure vulnerabilities, various hacking
techniques, and tools employed in the process.
11.0 Reference: -

httpswww.networkencyclopedia.con

https://www.campusifv.co.in

You might also like