A
Micro Project On
    R
“NETWORK HACKING”
GOVERNMENT POLYTECHNIC MALVAN
Diploma in Computer engineering
            Malvan
         (2024-2025)
                                  1|Page
                    A PROJECT REPORTED ON
                               "
                "NETWORK HACKING”
                          Submitted to
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION, MUMBAI. By
   the students of Third Year Diploma in “Computer Engineering‟
          3256     Aniket Suresh Renushe.
                                       .
          3270     Ajay Lalsing Jadhav.
          3271     Bhushan Shravan Jadhav .
   Mahadik Mam                           Prof – T.V.Mitke Mam
   Mam
      (Guide)                                 (H.O.D)
                                                            2|Page
         GOVERNMENT POLYTECHNIC MALVAN
                                   2024-2025
                                CERTIFICATE
                      This is to certify that, the micro project title
                          “NETWORK HACKING”
                                Is being submitted by,
                   NAME                         Enrollment NO.
      1. Aniket Suresh Renushe                    2201170306
      2. Ajay Lalsing Jadhav                      23110230186
      3. Bhushan Shravan Jadhav                   23110230187
        Above students has successfully completed the micro project work in subject
MAN (22509) during the sixth semester academic year 2024-2025 for the partial
fulfillment of Third year diploma in ELECTRONICS & COMMUNICATION
ENGINEERING under supervision and guidance.
            GUIDE                                                     HOD
        Ms.Mahadik Mam                                       Prof.T.V.Mitake Mam
      **     NETWORK HACKING **
                           INDEX
Sr.                   Content             Page No.
No
 1     Rationale                             5
 2     Aim of the microproject               5
 3     Course Outcomes                       6
 4     Literature review                     6
 5     Actual Methodology Followed           6
 6     Actual Resources Used                 7
 7     Entire info of the micro project     8 to 22
 8     Skills Developed                      23
 9     Applications                          23
10     Conclusion & References               24
1.0 Rationale
Network hacking refers to the act of gaining unauthorized access to a computer
network and its infrastructure resources, such as devices, servers, software, and
other services. Network hacking involves gathering information about a target
network, identifying vulnerabilities, and exploiting them to gain access. A variety of
tools and techniques used to identify potential security threatsin computer networks.
Network Hacking is gathering an information from network and computers over the
internet.
2.0 Aims and benefits of the micro project:
Network hacking is a serious hreat to computer networks and
systems. It is important for individual sand organizations to
understand the risks
and implement appropriate security measures to prevent
unauthorized access to their networks and data.
3.0 Course outcomes achieved: -
➤ Describe Network Infrastructure Vulnerabilities
➤ Describe Messaging Systems
➤ Project Management Skills
➤Creativity and Innovation
4.0 Literature review: -
The Explosive growth of the Internet has brought many good
things such as E-commerce-banking, E-mail, cloud computing,
but there is also a dark side such as Hacking, Backdoors,
Trapdoors etc. Hacking is the first big problem faced by
Governments, companies, and private citizens around the world.
Hacking means reading emails of someone, stealing passwords,
stealing credit card numbers etc. An ethical hacker is one who
can help the people who are suffered by these hackings. This
project describes about Network hackers, it's types and phases of
hacking.
5.0 Actual Methodology followed: -
• First, I thinkabout topic and then decided the topic of project.
• Did some research on the selected topic.
• We focused on the materials we needed, as well as gathered
information about Networking hacking and its tools.
• Collecting some pictures about network hacking for describing
much better and easily.
• Prepared a report and Checked for any further changes to be
done in the project.
Sr. Name of         Specifications            Quantit Remark
No Resources/materi                           y       s
.   al
     Book              Emerging Trends in     01       -
                       Information and
1                      Technology
2    Book              Network Hacking        01       -
                       Author
3    Website                                  01       -
                       https://www.network
                       en
Information:
1) Network Infrastructure:
To have secure operating systems and applications, you need a
secure network. Devices such as routers, firewalls, and even
generic network hosts (including servers and workstations) must
be assessed as part of the security testing process.
There are thousands of possible network vulnerabilities, equally
as many tools, and even more testing techniques. You probably
don't have the time or resources available to test your network
infrastructure systems for all possible vulnerabilities, using every
tool and method imaginable. Instead, you need to focus on tests
that will produce a good overall assessment of your network and
the tests I describe in this chapter produce exactly that.
You can eliminate many well-known, network-related
vulnerabilities by simply patching your network hosts with the
latest vendor software
Network Infrastructure Vulnerabilities: -
Network infrastructure vulnerabilities are the foundation for most
technical security issues in your information systems.
These lower-level vulnerabilities affect practically everything
running on your network. That's why you need to test for them
and eliminate them whenever possible.
Your focus for security tests on your network infrastructure
should be to find weaknesses that others can see in your network
so you can quantify and treat your network's level of exposure
Scanning-Ports:-
A port scanner shows you what's what on your network by
scanning the network to see what's alive and working. Port
scanners provide basic views of how the network is laid out.
They can help identify unauthorized hosts or applications and
network host configuration errors that can cause serious security
vulnerabilities.
The big-picture view from port scanners often uncovers security
issues that might otherwise go unnoticed. Port scanners are easy
to use and can test network hosts regardless of what operating
systems and applications they're running. The tests are usually
performed relatively quickly without having to touch individual
network hosts, which would be a real pain otherwise.
The trick to assessing your overall network security is interpreting the
results you get from a port scan. You can get false positives on open
ports, and you might have to dig deeper. For example, User Datagram
Protocol (UDP) scans like the protocol itself are less reliable than
Transmission Control Protocol (TCP) scans and often produce false
positives because many applications don't know how to respond to
random incoming UDP requests.
your results don't match after you run the tests using different tools, you
might want to explore the issue further. If something doesn't look right
such as a strange set of open ports it probably isn't. Test again; if you're in
doubt, use another tool for a different perspective.
Port No                Service                   Protocols
7                      Echo                      UDP
19                     Chargen                   Chargen
20                     FTP data (File Transfer   TCP
                       Protocol)
22                     SSH                       TCP
    Ping Sweep: -
    What is Ping Sweep?
    The IP address has many functionalities. Ping sweep is a
      term related to it. Scanning ping is one of the most
      efficient ways to find network vulnerabilities and tackle
      network-related discoveries. It also saves lots of time
      because the procedure related to ping sweep is pretty
      simple. Pinging a simple service similar to google.com
      gives back many results and we can learn our situation
      depending on the result we get back. Pinging a
   network or system allows us to determine if a host is
   alive or dead. This network-based utility can ping one
Purpose of Ping Sweep
Ping sweep is used to gain various information over the host. It has the
   potential to address a range of IPs for live mapping. In regular pinging,
   we have echo request and echo-response functions. It's a way of data
   request and gaining sufficient knowledge on a network device. It can
   also map a range of IPs. Echo request reveals information regarding
   the IP we ping. Local pinging directs via local DNS server and input has
   a round-trip time (RTT). But ping sweep uses ICMP echo request. It can
   send packets of data to reveal in-depth information about a host or
   range of hosts. Finding out live and dead Ips, detecting bad traffic and
   rogue network devices, and matching only permitted IPs on the
   network are a few results that can be documented by ping sweeping.
   Regular pinging can be done on console command on admin devices
   but ICMP echoing requires advanced software packages. Same reason
   they can be manipulated away the admin wants to achieve live
   mapping a DHCP environment
7.0 Skill developed: -
  ❖ Problem solving approach
  ❖ Planning
  ❖ Design skill
  ❖ Logical skill
  ❖ Programming
  ❖ Testing and Troubleshooting
   ❖ Presentation
   ❖ Report writing
   ❖ Analysing the problem
 9.0 Applications of the Micro-Project: -
 Network hacking is a serious threat to computer networks and
   systems. It is important for individuals and organizations to
   understand the risks and implement appropriate security
   measures to prevent unauthorized access to their networks
   and data.
10.0 Conclusion:
 The micro-project titled "Network Hacking" explores the realm o
   unauthorized access to computer networks, emphasizing the
   importance of understanding and mitigating the risks
   associated with network security. The project delves into
   network infrastructure vulnerabilities, various hacking
   techniques, and tools employed in the process.
11.0 Reference: -
httpswww.networkencyclopedia.con
https://www.campusifv.co.in