Vidhan Poddar
Vidhan Poddar
Vidhan Poddar
We further certify that to the best of our knowledge and belief, the matter presented in
this project has not been submitted to any other Degree or Diploma course.
Monica Gaud
External Examiner
DECLARATION
Date:
MITU21BCAA0033
ACKNOWLEDGMENTS
First of all, I would like to thank MIT College of Management, MIT-ADT University for
giving me this opportunity to carry out such kind of research. I would like to extend my
sincere thanks to Dr. Sunita Karad, Dean of Management and Director of ICT, and Prof. Dr.
Geeta Rao, Head of Academics, for their support and encouragement for this seminar and
report writing.
I am highly indebted to Prof. Monica Gaud for her guidance and constant supervision, as well
as for supporting me in completing this project. Her feedback throughout the research and her
insights have helped in shaping this project.
I would also like to thank all the individuals who were a part of this research and helped in
the survey. It helped to find meaningful findings and conclusions.
I would also like to express my gratitude towards my Family and Friends for their kind
cooperation and encouragement.
At last, I ended up thanking all who helped me in finalizing the project within the limited
timeframe.
Date:
MITU21BCAA0033
Table of Contents
1 INTRODUCTION 5–7
2 CONCEPTUAL BACKGROUND 10 – 11
4 SWOT ANALYSIS 17 – 20
5 FINDINGS 21 – 22
6 FUTURE SCOPE 23 – 24
8 CONCLUSION 27 – 28
9 REFERENCES
Introduction
Let us start with the basics of hacking and what are the different types
of hacking.
Now many people think what are these terms authorized and
unauthorized act(access).
The main purpose of taking this topic was to give a brief idea about
types of hacking that are currently taking place with lots of people
and how we can know about them. All the information will be for
educational purposes and you can try some of the hacking tools on
your dummy phone too.
Many hackers use Kali to hack someone's device which is a part of
the Linux operating system.
It has been proved that only black hat hackers use Kali as an operating
system because there are so many pre-installed security applications
for exploitation, forensics, hardware hacking, and other purposes. For
example, Black Hat USA used Kali Linux as the attacking platform
during its 2018 penetration testing course.
Conceptual background
SQL Injections
•An SQL injection is a technique that allows hackers to play upon the
security vulnerabilities of the software that runs a website.
•This process involves entering portions of SQL code into a web form
entry field – most commonly usernames and passwords – to give the
hacker further access to the site's backend, or a particular
https://www.techpanda.org/index.php
How to prevent SQL injection?
• The thief searches the victim’s system for FTP login details and
then relays them to his own remote computer.
• He then logs into the website via the remote computer and
modifies the web pages as he or she pleases.
One of the ways to use FTP password is shown below:
hydra -h
For example, the infamous “Friday the 13th” virus attacked the host
systems only on specific dates; it “exploded” (duplicated itself) every
Friday which happened to be the thirteenth of a month, thus causing
system slowdowns.
today = date.today()
def show_message():
print(" ")
exit()
def bomb():
if (today == target):
show_message()
bomb()
Try this above code and it will show up on 25th December like the
image shown below:
Denial-of-Service attack
• This causes the resource (e.g. a web server) to crash or slow down
significantly so that no one can access it.
• Using this technique, the attacker can render a web site inoperable
by sending massive amounts of traffic to the targeted site.
Phishing
Voice Phishing
Voice phishing uses phone calls instead of emails to scam victims.
For example, a voicemail or direct call from the bank, stating
suspicious activity on your account and asking you to call back using
the provided number, which leads to a scammer.
How to Spot a Phishing Email
1. Suspicious Email Addresses
2. Grammar and Spelling Mistakes
3. Unfamiliar Greetings or Sign-offs
4. Suspicious Links or Attachments
5. Requests for Personal Information
6. Urgent or Threatening Language
Trojan Horse
Market Dynamics: The demand for white hat hackers has been steadily
increasing as organizations recognize the importance of proactive
cybersecurity measures. This has led to the growth of cybersecurity
firms offering penetration testing and ethical hacking services.
The above analysis shows the clear picture of types of hacking going
world -wide with most crypto-miners and least ATM malware.
SWOT ANALYSIS
Strengths:
Weaknesses:
1. Collaboration with other tools: Kali Linux can integrate with other
security tools and platforms, expanding its capabilities and enhancing
its effectiveness in various hacking scenarios.
Threats:
1. Types of Hacking:
Unpatched Software:
1. Vulnerability: Failure to apply security patches and updates
leaves software vulnerable to known exploits and
vulnerabilities.
2. Mitigation: Establish a patch management process to
regularly update software and systems with the latest
security patches. Monitor vendor security advisories and
prioritize critical updates. Employ automated patch
management tools to streamline the process and ensure
timely updates.
3. Social Engineering:
Financial Losses:
Reputational Damage:
Privacy Breaches:
Hacking often involves the unauthorized access or disclosure of
sensitive personal information, leading to privacy breaches.
Stolen data may include personally identifiable information (PII),
financial records, or healthcare data. Privacy breaches can have
serious consequences for individuals, including identity theft,
fraud, and emotional distress.
6. Emerging Trends:
Ransomware Attacks:
IoT Vulnerabilities:
1. Encryption:
5. Patch Management:
Phishing Awareness:
Password Hygiene:
Try to be one of the good hackers like ethical hacker and use the
writing tools where needed
Also be aware of the other hackers because they can come find you by
tracking your address of your local machine, Mobile Phone, or other
electronic devices.
Reference Links:
https://www.csoonline.com/article/510947/logic-bomb.html
https://www.geeksforgeeks.org/how-to-crack-ftp-passwords/
https://security.berkeley.edu/education-awareness/how-protect-
against-sql-injection-attacks
https://medium.com/hengky-sanjaya-blog/sql-injection-tutorial-learn-
with-example-20e1729cfbb