Synopsis Ethical Hcking

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

ETHICAL HACKING SYNOPSIS

Exploiting Windows / Linux & Databases


PROJECT REPORT

On

Six Weeks Training


at

KVCH (LEARNING PARTNER OF ORACLE WDP )


Submitted in partial fulfillment of the requirements for the award of
The Degree of

B.TECH
ELECTRONICS AND COMMUNICATION ENGINEERING
SESSION: 2015-2019
By :-
Anish Kumar
RollNo: S15ECE005

DEPARTMENT OF ELECTRONICS & COMMUNICATION


ENGINEERING
NGF COLLEGE OF ENGINEERING & TECHNOLOGY
PALWAL (HARYANA)
(Affiliated to Maharishi Dayanand University,Rohtak)
ETHICAL HACKING SYNOPSIS

NGF College Of Engineering & Technology

Palwal, (Haryana)

Declaration

We hereby declare that the work which is being presented in the


B.Tech Project report entitled “ Exploiting Windows / Linux &
Databases ” in partial fulfilment of requirements for the award of
degree of the Bachelor of Technology in Electronics &
Communication Engineering submitted to Maharshi Dayanand
University, Rohtak is an authentic record of our own work carried out
during a period from February 2019 to June 2019. The matter presented
in this project has not been submitted by us for the award of any other
degree elsewhere.

Anish Kumar

Roll no. S15ECE005


ETHICAL HACKING SYNOPSIS

ACKNOWLEDGEMENT

We take this opportunity to thank all those who have helped us in


completing the project successfully.

We would like to express our gratitude to Mr. SUSHIL SHARMA ,


who as our guide/mentor provided us with every possible support and
guidance throughout the development of project. This project would
never have been completed without her encouragement and support.

We would also like to show our gratitude to Ms. Suman Dagar , Head
of Department for providing us with well trained faculty and giving us
all the required resources and a healthy environment for our carrying
out our project work.

We sincerely thank to Deputy Dean academics & Principal of NGF


College of Engineering & Tech. Palwal (HR.) for providing us a
platform to build this project.
ETHICAL HACKING SYNOPSIS

ABSTRACT

This is a project report on “Ethical Hacking” During the


making/developing of this project we explored new ideas and
functionality behind the working of a Kali Linux an OS made for
Hacking.

We have learnt a lot during this project and liked the improvement
in our testing skills and deep concept related to these kinds of
projects.

Our project is “ Exploiting Windows / Linux & Databases ”

Project Phases

. Lab Setup KALI OS and Victim Machines

• Footprinting Victim Machines


. Exploiting Windows / Linux OS
• Database Vulnerability Check
• Hacking Various Types of databases
ETHICAL HACKING SYNOPSIS

PREFACE

Learning comes from doing. To learn something one has to go through


Practical conditions. Recognizing this fact, the University has made it
essential for B.Tech students to undergo Industrial Training for Five
month. During this period, the student learns about the functioning
about the knowledge of Ethical hacking of organization detail. Also this
training helps the student how to implement the security base
knowledge into practical life, in our day to day life. This project report
was prepared during the training period in the month of June– July.

During this period, an effort was made to understand “ Exploiting


Windows / Linux & Databases ” and to finish the project work assigned
to us. This report lays special emphasis on the operational work, tasks
and projects carried out during the training period.

TABLE OF CONTENTS

1. Introduction of Ethical Hacking


1.1 Introduction
1.2 Role of security & Penetration tester
1.3 Hackers class
ETHICAL HACKING SYNOPSIS

1.4 Hacking tools


1.5. Basic layout of attack
1.6. Hacking Process

2. IP Address
2.1 Introduction
2.2 Classes Of IP address
2.3 Configurations

3. Subneting of IP address
3.1 IP Range
3.2 Subnetmask range

4. OSI Model
4.1 Introduction
4.2 Types Of Layers

5. Installation of Operating system & VMware workstation


5.1 Installation Of VMware workstation
5.2 Installation Of kali linux
5.3 Installation Of Windows 7

6. Post Installation in kali linux


6.1 Tools / Drivers installing
6.2 System update & upgrade

7. Footprinting
7.1 Introduction
7.2 nmap ( Using CLI Base )
7.3 Zenmap ( Using GUI Tool )

8. Scanning
8.1 introduction
8.2 classification of scanning
8.3 Scanning Methodology
ETHICAL HACKING SYNOPSIS

9. Windows /Linux Exploitation


9.1 Preparation Footprinting
9.2 Scanning Victim Open Ports
9.3 Launching Hacking Tools
9.4 Final Results

10. Database Hacking


10.1 Check database Vulnerability
10.2 What is SQL map
10.3 Hacking Various Types of databases
10.4 Final Results

You might also like