Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/1564
Title: Penetrating Computer Networks and providing Security by means of Ethical Hacking
Authors: Bhatt, Chintan Maheshbhai
Keywords: EC 2008
Project Report 2008
EC Project Report
Project Report
EC (Communication)
Communication
08MECC
08MECC03
Communication
Communication 2008
Issue Date: 1-Jun-2010
Publisher: Institute of Technology
Series/Report no.: 08MECC03
Abstract: Network Security is now a days a big issue for the big industries,companies because if there are any loopholes in their computer network then whole database can be accessed by other hackers which may create a big problems to companies.So here are some techniques given through which we can access that database and also security part is there to avoid this unauthorized login.This report presents techniques of pen- etrating the computer network. Here I am working with the di erent methods of penetration of network like SQL injection, Trojan intrusion system, Email tracing system, Code injection attacks. Here I am not dealing with all kind of Attack, but I am working with some most famous methods which are used mostly. I am working with Email Tracing System which helps to nd out the email root.Here also some details are given for encryptor which is used to encrypt the Trojan and most of mal- ware type les which have to be sent over the network. Here I am also creating some algorithms which encrypts the le means adds extra bits to the digital signature of that secret le to make them undetectable in Antivirus system. I am also building password hacking algorithm to crack the password.Here I will show a demo of LAN gaming through which any ones computer can be attacked.There is bright scope be- hind this terminology because if your system is not secure then your data can be theft and your organization will be in loss. So security is the main policy behind this ethical hacking." The person who can hack only that can secure the network". So securing the network is also an important task. Big companies have large no of hackers.
URI: http://hdl.handle.net/123456789/1564
Appears in Collections:Dissertation, EC (Communication)

Files in This Item:
File Description SizeFormat 
08MECC03.pdf08MECC033.91 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.