You are on page 1of 27

A

Micro Project Report


On

“Types of Hacking”

Submitted by
Saloni Nivrutti Patil
Tanishka Kiran Chopadkar
Devang Jitendra Bhattad
Divya Dattatray Rahane

Under the Guidance of


Prof.B.D.Bhujang
In the Partial Fulfilment of Sixth Semester of Diploma in
Computer Engineering

Department of Computer Engineering


Sandip Polytechnic
Mahiravani, Nashik - 22616

Affiliated to

Maharashtra State
Board of Technical Education

Academic Year 2023-24


Maharashtra State
Board of Technical Education
Certificate

This is to certify that Ms. Saloni Nivritti Patil with Roll No- 05 has successfully completed
Micro-project in course “Emerging Trends in Computer and Information
Technology”(22618) for the academic year 2023-24 as prescribed in the 'Assessment Manual'
during her tenure of completing sixth Semester of Diploma Program in Computer Engineering
from institute, Sandip Polytechnic with institute code 1167.

Place: Nashik Enrollment No:2111670129

Date: Exam Seat No:

Course Teacher Head of the Department Head of the Institute


Maharashtra State
Board of Technical Education
Certificate

This is to certify that Ms. Tanishka Kiran Chopadkar with Roll No- 12 has successfully
completed Micro- project in course “Emerging Trends in Computer and Information
Technology”(22618) for the academic year 2023-24 as prescribed in the 'Assessment Manual'
during her tenure of completing sixth Semester of Diploma Program in Computer Engineering
from institute, Sandip Polytechnic with institute code 1167.

Place : Nashik Enrollment No:2111670139

Date: Exam Seat No:

Course Teacher Head of the Department Head of the Institute


Maharashtra State

Board of Technical Education


Certificate

This is to certify that Mr. Devang Jitendra Bhattad with Roll No- 41 has successfully completed
Micro-project in course “Emerging Trends in Computer and Information
Technology”(22618) for the academic year 2023-24 as prescribed in the 'Assessment Manual'
during his tenure of completing sixth Semester of Diploma Program in Computer Engineering
from institute, Sandip Polytechnic with institute code 1167.

Place: Nashik Enrollment No:2111670183

Date: Exam Seat No:

Course Teacher Head of the Department Head of the Institute


Maharashtra State
Board of Technical Education
Certificate

This is to certify that Ms. Divya Dattatray Rahane with Roll No- 47 has successfully completed
Micro-project in course “Emerging Trends in Computer and Information
Technology”(22618) for the academic year 2023-24 as prescribed in the 'Assessment Manual'
during her tenure of completing sixth Semester of Diploma Program in Computer Engineering
from institute, Sandip Polytechnic with institute code 1167.

Place : Nashik Enrollment No:2111670191

Date: Exam Seat No:

Course Teacher Head of the Department Head of the Institute


Annexure – I

Micro Project Proposal


Types of Hacking
1.0 Aims/Benefits of the Micro-Project:
To understand the concept of the hacking and apply at the places required. The main
aim of this micro project is to understand the concept about hacking with the help of
Types of Hacking.

2.0 Course Outcomes Addressed:


1. Describe Artificial Intelligence, Machine learning and deep learning.
2. Compare Model of Digital Forensic Investigation.
3. Describe Evidence Handling procedures.
4. Describe Ethical Hacking process.
5. Detect Network, Operating System and application vulnerabilities.

3.0 Proposed Methodology:


After choosing the topic for our micro-project, we decided to collect some information
related to our project topic and do some research on it. Based on that information we would
do some research related to types of hacking.

4.0 Action Plan:

Sr. Planned Planned Name of Responsible


Details of Activity
No Start Date Finish Date TeamMembers
1 Topic Discussion & Selection
2 Aim/Benefits & Importance
3 Resources Required
4 Analysis of Collected Data 1. Saloni Nivrutti Patil
2. Tanishka Kiran Chopadkar
5 Design & editing of data
3. Devang Jitendra Bhattad
6 Compilation of Report 4. Divya Dattatray Rahane

7 Compilation of Presentation
8 Presentation of Seminar
9 Final Submission
5.0 Resources Required:

Sr Name of Resource/Material Specification Qty. Remarks


1 Hardware Resource Intel i3,2GB RAM 1 -
2 Software Resource Microsoft word 1 -
3 Any Other Resource Internet 1 -

Name of Team Members with Roll No:

Roll No Name of Team Members


05 Saloni Nivrutti Patil
12 Tanishka Kiran Chopadkar
41 Devang Jitendra Bhattad
47 Divya Dattatray Rahane

Name & Signature of Course Teacher


(Prof.B.D.Bhujang)
Annexure – II

Micro Project Report


1.0 Rationale:
To understand the basic concepts about hacking and Prevent loss of People by
understanding types of hacking.
2.0 Aims/Benefits of the Micro-Project:
To learn and understand the concepts of the Emerging Trends in Computer and
Information Technology i.e learning concept of Ethical hacking, Types of hackers,
Types of cybercrime The main aim of this micro-project is to understand the how the
hacking is increasing day by day .
3.0 Course Outcomes Achieved:

1. Describe Artificial Intelligence, Machine learning and deep learning.


2. Compare Model of Digital Forensic Investigation.
3. Describe Evidence Handling procedures.
4. Describe Ethical Hacking process.
5. Detect Network, Operating System and application vulnerabilities.

4.0 Literature Review:


Hacking can help identify vulnerabilities in a system or network that can be fixed to prevent
malicious attacks by cybercriminals.

5.0 Actual Methodology Followed:


After the topic for our project was selected, we segregated the work load as follows
1. Researching and collecting the required information was done by our team members Divya,
Saloni, Tanishka and Devang.
2. Arrangement of this work in appropriate manner and cross checking of the same was done
by Divya and Saloni.
3. Compiling this work and formatting of the report was done by the Tanishka and Devang.
6.0 Actual Resources Used:

Sr
Name of Resource/Material Specification Qty. Remarks
No
1 Hardware Resource Intel i3,2GB RAM 1 -
2 Software Resource Microsoft word 1 -
3 Any Other Resource Internet 1 -
Types of Hacking :-

Phishing –
In this type of hacking, hackers intention is to steal critical information of users like
account passwords, MasterCard detail, etc. For example, hackers can replicate an original
website for users interaction and can steal critical information from the duplicate website
the hacker has created.

Virus –
These are triggered by the hacker into the filters of the website once they enter into it . The
purpose is to corrupt the information or resources on the net website.

UI redress –
In this technique, the hacker creates a pretend interface and once the user clicks with the
intent of progressing to a particular website, they are directed to a special website.

Cookie theft –
Hackers access the net website exploitation malicious codes and steal cookies that contain
tips, login passwords, etc. Get access to your account then will do any factor besides your
account.

Distributed Denial-of-service(DDoS) –
This hacking technique is aimed toward taking down a website so that a user cannot access
it or deliver their service. Gets the server down and stops it from responding, which may
cause a condition error constantly.
DNS spoofing –
This essentially uses the cache knowledge of an internet website or domain that the user
might have forgotten keeping up to date. It then directs the data to a distinct malicious
website.

Social Engineering –
Social engineering is an attempt to manipulate you to share personal info, sometimes by
impersonating a trustworthy supply.

Missing Security Patches –


Security tools will become outdated as a result of the hacking landscape advancement and
needs frequent updates to protect against new threats.

Malware-Injection Devices –
Cyber-criminals will use hardware to sneak malware onto your pc. You would have
detected infected USB sticks which can allow hackers remote access to your device when
Types of Hackers:-

Hackers can be classified into three different categories:

1. Black Hat Hacker

2. White Hat Hacker

3. Grey Hat Hacker

Black Hat Hacker

Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These
people hack the system illegally to steal money or to achieve their own illegal goals. They find
banks or other companies with weak security and steal money or credit card information. They
can also modify or destroy the data as well. Black hat hacking is illegal.

White Hat Hacker

White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat
hackers are the good guys of the hacker world.These people use the same technique used by the
black hat hackers. They also hack the system, but they can only hack the system that they have
permission to hack in order to test the security of the system. They focus on security and
protecting IT system. White hat hacking is legal.
Gray Hat Hacker

Gray hat Hackers are Hybrid between Black hat Hackers and White hat hackers. They can hack
any system even if they don't have permission to test the security of the system but they will
never steal money or damage the system. In most cases, they tell the administrator of that
system. But they are also illegal because they test the security of the system that they do not
have permission to test. Grey hat hacking is sometimes acted legally and sometimes not.
Cyber Crime:-

Cybercrime or a computer-oriented crime is a crime that includes a computer and a


network. The computer may have been used in the execution of a crime or it may be the
target. Cybercrime is the use of a computer as a weapon for committing crimes such as
committing fraud, identity theft, or breaching privacy. Cybercrime, especially through the
Internet, has grown in importance as the computer has become central to every field like
commerce, entertainment, and government. Cybercrime may endanger a person or a
nation’s security and financial health. Cybercrime encloses a wide range of activities, but
these can generally be divided into two categories:

1. Crimes that aim at computer networks or devices. These types of crimes


involve different threats (like virus, bugs etc.) and denial-of-service (DoS)
attacks.

2. Crimes that use computer networks to commit other criminal activities. These
types of crimes include cyber stalking, financial fraud or identity theft.

Types of Cybercrime:-

Cyber Terrorism –
Cyber terrorism is the use of the computer and internet to perform violent acts that
result in loss of life. This may include different type of activities either by software
or hardware for threatening life of citizens.
In general, Cyber terrorism can be defined as an act of terrorism committed through
the use of cyberspace or computer resources.
Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system is
subjected to or threatened with repeated denial of service or other attacks by
malicious hackers. These hackers demand huge money in return for assurance to
stop the attacks and to offer protection.

Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of
computers, online control systems and networks. It involves both offensive and
defensive operations concerning to the threat of cyber attacks, espionage and
sabotage.

Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and could
include hiding of information or providing incorrect information for the purpose of
deceiving victims for money or property. Internet fraud is not considered a single,
distinctive crime but covers a range of illegal and illicit actions that are committed
in

Internet stalkers -
Internet stalkers are people who maliciously monitor the web
Activity of their victims to acquire personal data. This type of cybercrime is
Conducted through the use of social networking platforms and malware, they
Are able to track an indivisual’s PC activity with little or no detection.
Prevention of Cyber Crime:
Below are some points by means of which we can prevent cyber crime:
Use strong password –
Maintain different password and username combinations for each account and resist the
temptation to write them down. Weak passwords can be easily cracked using certain
attacking methods like Brute force attack, Rainbow table attack etc, So make them
complex. That means combination of letters, numbers and special characters.

Use trusted antivirus in devices –


Always use trustworthy and highly advanced antivirus software in mobile and personal
computers. This leads to the prevention of different virus attack on devices.

Keep social media private –


Always keep your social media accounts data privacy only to your friends. Also make sure
only to make friends who are known to you.

Keep your device software updated –


Whenever you get the updates of the system software update it at the same time because
sometimes the previous version can be easily attacked.

Use secure network –


Public Wi-Fi are vulnerable. Avoid conducting financial or corporate transactions on these
networks.

Never open attachments in spam emails –


A computer get infected by malware attacks and other forms of cybercrime is via email
attachments in spam emails. Never open an attachment from a sender you do not know.
Introduction to Ethical Hacking:-

Ethical hacking is also known as White hat Hacking or Penetration Testing. Ethical hacking
involves an authorized attempt to gain unauthorized access to a computer system or data.
Ethical hacking is used to improve the security of the systems and networks by fixing the
vulnerability found while testing.

Ethical hackers improve the security posture of an organization. Ethical hackers use the same
tools, tricks, and techniques that malicious hackers used, but with the permission of the
authorized person. The purpose of ethical hacking is to improve the security and to defend the
systems from attacks by malicious users.

Types of Hacking

We can define hacking into different categories, based on what is being hacked. These are as
follows:

1. Network Hacking

2. Website Hacking

3. Computer Hacking

4. Password Hacking

5. Email Hacking

Network Hacking: Network hacking means gathering information about a network with the
intent to harm the network system and hamper its operations using the various tools like
Telnet, NS lookup, Ping, Tracert, etc.

Website hacking: Website hacking means taking unauthorized access over a web server,
database and make a change in the information.
Computer hacking: Computer hacking means unauthorized access to the Computer and
steals the information from PC like Computer ID and password by applying hacking
methods.

Password hacking: Password hacking is the process of recovering secret passwords from
data that has been already stored in the computer system.

Email hacking: Email hacking means unauthorized access on an Email account and using it
without the owner's permission.

Advantages of Hacking

There are various advantages of hacking:

1. It is used to recover the lost of information, especially when you lost your password.

2. It is used to perform penetration testing to increase the security of the computer and
network.
3. It is used to test how good security is on your network.

Disadvantages of Hacking

There are various disadvantages of hacking:

1. It can harm the privacy of someone.

2. Hacking is illegal.

3. Criminal can use hacking to their advantage.

4. Hampering system operations.


Prevention From Hacking

Use a firewall to secure your computers from hackers:-

Windows and macOS have built-in firewalls — software designed to create a barrier between
your information and the outside world. Firewalls prevent unauthorized access to your business
network and alert you to intrusion attempts.

Ensure the firewall is enabled before going online. You can also purchase a hardware firewall
from companies like Cisco, Sophos or Fortinet, depending on your broadband router, which
also has a built-in firewall that protects your network. If you have a larger business, you can
purchase an additional business networking firewall.

Install antivirus software to thwart hackers:-

Antivirus software is a small business cybersecurity necessity. Computer viruses and malware
are everywhere. Antivirus programs like Bitdefender, Panda Free Antivirus, Malwarebytes, and
Avast protect your computer against unauthorized code or software that may threaten your
operating system. Viruses may have easy-to-spot effects — for example, they might slow your
computer or delete critical files — or be less conspicuous.

Antivirus software plays a major role in protecting your system by detecting real-time threats to
ensure your data is safe. Some advanced antivirus programs provide automatic updates, further
protecting your machine from the new viruses that emerge daily.

After installing an antivirus program, don’t forget to use it. Run or schedule regular virus scans
to keep your computer virus-free.
Install an antispyware package to protect your business:-

Spyware is software that secretly monitors and collects personal or organizational information.
It’s hard to detect and remove and usually delivers unwanted ads or search results intended to
direct you to specific (often malicious) websites. Some spyware records every keystroke to gain
access to passwords and other financial information.

Antispyware concentrates exclusively on this threat but is often included in major antivirus
packages, including Webroot, McAfee, and Norton. Antispyware packages provide real-time
protection by scanning all incoming information and blocking threats.

Use complex passwords to prevent network intrusions:-

Using strong passwords is a crucial way to prevent network intrusions. The more secure your
passwords are, the harder it is for hackers to invade your system.

Secure passwords are usually longer and more complex. Use a password with at least eight
characters and a combination of numbers, uppercase and lowercase letters, and computer
symbols. Hackers have an arsenal of tools to break short, easy passwords in minutes.

Don’t use recognizable words or combinations representing birthdays or other information


hackers can connect to you. Don’t reuse passwords, either. If you have too many passwords to
remember, consider using a password manager, such as Dashlane, Sticky Password, LastPass,
or Password Boss.
Keep your OS, apps and browser updated:-

Always install operating system updates. Most updates include security fixes that prevent
hackers from accessing and exploiting your data. The same goes for apps.

Today’s web browsers are increasingly sophisticated, especially regarding privacy and security.
Review your browser security settings in addition to installing all new updates. For example,
you can use your browser to prevent websites from tracking your movements, which increases
your online privacy. You can also use a private browsing mode or install a browser specifically
focused on security, like DuckDuckGo or Epic Privacy Browser.

Ignore spam to stop hackers from infiltrating your system:-

Beware of email messages from unknown parties, and never click on links or open attachments
that accompany them. Inbox spam filters have become good at catching the most conspicuous
spam. But more sophisticated phishing emails that mimic your friends, associates and trusted
businesses (like your bank) have become common, so keep your eyes open for anything that
looks or sounds suspicious.
9.0 Skill Developed:

• Describe Artificial Intelligence, Machine learning and deep learning.


• Compare Model of Digital Forensic Investigation.
• Describe Evidence Handling procedures.
• Describe Ethical Hacking process.
• Detect Network, Operating System and application vulnerabilities.

Name & Signature of Course Teacher


(Prof.B.D.Bhujang)
Annexure – III

Micro Project Evaluation Sheet


Name of Student: Saloni Nivrutti Patil Enrollment No: 211670129
Name of Program: Computer Engineering Semester: sixth
Course Title: Emerging Trends in Computer and IT Course Code: 22618
Title of Micro Project Types of Hacking

Course Outcomes Achieved:

Poor Average Good Excellent


Sr Sub
Characteristic to be Assessed Marks Marks Marks Marks
No Total
(1-3) (4-5) (6-8) (9-10)
(A) Process and Product Assessment (6 Marks)
1 Relevance to the Course
2 Literature Review/Information Collection
3 Completion of the Targets per Project Proposal
4 Analysis of Data & Representation
5 Quality of Prototype/Model
6 Report Preparation
(B) Individual Presentation/Viva (4Marks)
7 Presentation
8 Viva

(A) (B)
Total Marks
Process and Product Assessment Individual Presentation/Viva
(10 Marks)
(6 Marks) (4 Marks)

Comments/Suggestions about Teamwork/Leadership/Inter-personal Communication (if any)


…………………………………..……………………………………………………………………………

Name &Designation of Course Teacher


(Prof.B.D.Bhujang)
Annexure – III

Micro Project Evaluation Sheet


Name of Student: Tanishka Kiran Chopadkar Enrollment No: 211670139
Name of Program: Computer Engineering Semester: sixth
Course Title: Emerging Trends in Computer and IT Course Code: 22618
Title of Micro Project: Types of Hacking

Course Outcomes Achieved:

Poor Average Good Excellent


Sr Sub
Characteristic to be Assessed Marks Marks Marks Marks
No Total
(1-3) (4-5) (6-8) (9-10)
(A) Process and Product Assessment (6 Marks)
1 Relevance to the Course
2 Literature Review/Information Collection
3 Completion of the Targets per Project Proposal
4 Analysis of Data & Representation
5 Quality of Prototype/Model
6 Report Preparation
(B) Individual Presentation/Viva (4Marks)
7 Presentation
8 Viva

(A) (B)
Total Marks
Process and Product Assessment Individual Presentation/Viva
(10 Marks)
(6 Marks) (4 Marks)

Comments/Suggestions about Teamwork/Leadership/Inter-personal Communication (if any)


…………………………………..……………………………………………………………………………

Name &Designation of Course Teacher


(Prof.B.D.Bhujang)
Annexure – III

Micro Project Evaluation Sheet


Name of Student: Devang Jitendra Bhattad Enrollment No: 211670183
Name of Program: Computer Engineering Semester: sixth
Course Title: Emerging Trends in Computer and IT Course Code: 22618
Title of Micro Project: Types of Hacking

Course Outcomes Achieved:

Poor Average Good Excellent


Sr Sub
Characteristic to be Assessed Marks Marks Marks Marks
No Total
(1-3) (4-5) (6-8) (9-10)
(A) Process and Product Assessment (6 Marks)
1 Relevance to the Course
2 Literature Review/Information Collection
3 Completion of the Targets per Project Proposal
4 Analysis of Data & Representation
5 Quality of Prototype/Model
6 Report Preparation
(B) Individual Presentation/Viva (4Marks)
7 Presentation
8 Viva

(A) (B)
Total Marks
Process and Product Assessment Individual Presentation/Viva
(10 Marks)
(6 Marks) (4 Marks)

Comments/Suggestions about Teamwork/Leadership/Inter-personal Communication (if any)


…………………………………..……………………………………………………………………………

Name &Designation of Course Teacher


(Prof.B.D.Bhujang)
Annexure – III

Micro Project Evaluation Sheet


Name of Student: Divya Dattatray Rahane Enrollment No: 211670191
Name of Program: Computer Engineering Semester: sixth
Course Title: Emerging Trends in Computer and IT Course Code: 22618
Title of Micro Project: Types of Hacking

Course Outcomes Achieved:

Poor Average Good Excellent


Sr Sub
Characteristic to be Assessed Marks Marks Marks Marks
No Total
(1-3) (4-5) (6-8) (9-10)
(A) Process and Product Assessment (6 Marks)
1 Relevance to the Course
2 Literature Review/Information Collection
3 Completion of the Targets per Project Proposal
4 Analysis of Data & Representation
5 Quality of Prototype/Model
6 Report Preparation
(B) Individual Presentation/Viva (4Marks)
7 Presentation
8 Viva

(A) (B)
Total Marks
Process and Product Assessment Individual Presentation/Viva
(10 Marks)
(6 Marks) (4 Marks)

Comments/Suggestions about Teamwork/Leadership/Inter-personal Communication (if any)


…………………………………..……………………………………………………………………………

Name &Designation of Course Teacher


(Prof.B.D.Bhujang)

You might also like