ETI Microproject
ETI Microproject
Micro-Project
On
NETWORK HACKING
Submitted To
MSBTE
In Partial Fulfilment of Requirement of Diploma Of
Computer Engineering
Under I Scheme
Submitted By
Mr. T.M.Patil
Seal of
Institutio
n
INDEX
2. Introduction 2
6. Skill Developed 11
7. Application 12
8. Conclusion 13
9. Reference 14
Department Of Computer Engineering Network Hacking
1. Abstract:-
YBIT 1
Department Of Computer Engineering Network Hacking
2. Introduction:-
In today’s increasingly interconnected world, network security is of paramount
importance. Networks form the backbone of communication systems, enabling
businesses, governments, and individuals to exchange data and conduct online
activities. However, as reliance on digital networks grows, so do the risks associated
with cyberattacks and unauthorized access to sensitive information. Network hacking
refers to the act of exploiting vulnerabilities in a network, often with malicious intent,
to gain unauthorized access, steal data, or disrupt services.
This microproject aims to delve into the techniques and tools used in network hacking,
shedding light on common methods such as packet sniffing, man-in-the-middle
(MitM) attacks, and denial-of-service (DoS) attacks. By exploring these techniques in
a controlled lab environment, the project will emphasize the importance of securing
networks against potential threats and highlight the role of ethical hacking and
penetration testing in improving security measures.
While the term "network hacking" often carries negative connotations, it is important
to distinguish between malicious hackers and ethical hackers—those who use their
skills to identify vulnerabilities and strengthen network defenses. In this project, we
will also focus on the ethical considerations of hacking and the critical need for robust
cybersecurity protocols.
YBIT 2
Department Of Computer Engineering Network Hacking
The overall goal is to educate and inform about the methods of network hacking, while
reinforcing the need for robust cybersecurity measures to safeguard sensitive
information and prevent unauthorized access.
YBIT 3
Department Of Computer Engineering Network Hacking
4. Network Hacking:-
1)Network Infrastructure :
To have secure operating systems and applications, you need a secure network.
Devices such as routers, firewalls, and even generic network hosts (including servers
and workstations) must be assessed as part of the security testing process.
There are thousands of possible network vulnerabilities, equally as many tools, and
even more testing techniques. You probably don't have the time or resources
available to test your network infrastructure systems for all possible vulnerabilities,
using every tool and method imaginable. Instead, you need to focus on tests that will
produce a good overall assessment of your network and the tests I describe in this
chapter produce exactly that.
Fig 1.1
YBIT 4
Department Of Computer Engineering Network Hacking
Network infrastructure vulnerabilities are the foundation for most technical security
issues in your information systems.
These lower-level vulnerabilities affect practically everything running on your
network. That's why you need to test for them and eliminate them whenever possible.
Your focus for security tests on your network infrastructure should be to find
weaknesses that others can see in your network so you can quantify and treat your
network's level of exposure.
Fig 1.2
YBIT 5
Department Of Computer Engineering Network Hacking
3)Scanning-Ports:
A port scanner shows you what's what on your network by scanning the network to
see what's alive and working. Port scanners provide basic views of how the network
is laid out. They can help identify unauthorized hosts or applications and network
host configuration errors that can cause serious security vulnerabilities.
The big-picture view from port scanners often uncovers security issues that might
otherwise go unnoticed. Port scanners are easy to use and can test network hosts
regardless of what operating systems and applications they're running. The tests are
usually performed relatively quickly without having to touch individual network
hosts, which would be a real pain otherwise.
The trick to assessing your overall network security is interpreting the results you get
from a port scan. You can get false positives on open ports, and you might have to dig
deeper. For example, User Datagram Protocol (UDP) scans like the protocol itself are
less reliable than Transmission Control Protocol (TCP) scans and often produce false
positives because many applications don't know how to respond to random incoming
UDP requests
Fig 1.3
If your results don't match after you run the tests using different tools, you might want
to explore the issue further. If something doesn't look right such as a strange set of
open ports it probably isn't. Test again; if you’re in doubt, use another tool for a
different perspective.
YBIT 6
Department Of Computer Engineering Network Hacking
7 Echo UDP
19 Chargen TCP, UDP
20 FTP data (File Transfer Protocol) TCP
22 SSH TCP
23 Telnet TCP
8080 HTTP HTTP proxy TCP
443 HTTPS (HTTP over TLS) TCP
4) Ping Sweep:
The IP address has many functionalities. Ping sweep is a term related to it. Scanning
ping is one of the most efficient ways to find network vulnerabilities and tackle
network-related discoveries. It also saves lots of time because the procedure related to
ping sweep is pretty simple. Pinging a simple service similar to google.com gives back
many results and we can learn our situation depending on the result we get back.
Pinging a network or system allows us to determine if a host is alive or dead.
simple IP or brute check a list of IPs in a single or continuous scan. In response to
pinging a host, we get back data as an echo. By calling it alive, we can identify if the
system is active and what is the network-based status around it. And dead means the
host is either inactive or non-responsive or in shutdown mode. Hosts can be the
network servers, computers, websites, printers, or any remote network device.
YBIT 7
Department Of Computer Engineering Network Hacking
5)Scanning SNMP:
Simple Network Management Protocol (SNMP) is built in to virtually every network
device. Network management programs (such as HP Open View and LANDesk) use
SNMP for remote network host management. Unfortunately. SNMP also presents
security vulnerabilities.
Fig 1.4
YBIT 8
Department Of Computer Engineering Network Hacking
Use network monitoring tools to track traffic patterns and detect unusual
activities that may indicate a potential security breach.
Regularly review log files from servers, firewalls, and routers to identify signs
of hacking attempts or unauthorized access.
YBIT 9
Department Of Computer Engineering Network Hacking
Train employees and network users about phishing attacks, social engineering,
and other common techniques hackers use to gain access.
Emphasize the importance of not clicking on suspicious links or downloading
files from untrusted sources.
Use role-based access control (RBAC) to grant users access to only the
resources they need.
Enforce the principle of least privilege, ensuring that users have the minimum
access necessary to perform their tasks.
YBIT 10
Department Of Computer Engineering Network Hacking
6.Skill Developed:-
Network hacking involves a wide range of technical skills and knowledge, which are
developed through practice, study, and real-world experience. Some of the key skills
developed in network hacking include:
These skills are essential for both ethical hackers and malicious actors, but they should
always be used responsibly and within legal boundaries to ensure cybersecurity rather
than compromise it.
YBIT 11
Department Of Computer Engineering Network Hacking
7.Application:-
Network hacking, while often associated with malicious activity, also has several
legitimate and constructive applications, particularly in the fields of cybersecurity and
IT defense. Here are some key applications:
While network hacking has these beneficial applications, it's important to emphasize
that hacking must always be done responsibly and within legal frameworks to avoid
ethical and legal consequences.
YBIT 12
Department Of Computer Engineering Network Hacking
8.Conclusion:-
YBIT 13
Department Of Computer Engineering Network Hacking
9.Reference:-
https://www.campusify.co.in
https://www.networkencyclopedia.com
YBIT 14