Hacking Full Report
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 8
Joined: Jan 2011
08-01-2011, 02:39 PM

Please send me the detail report on hacking and also documentation.Its urgent..
seminar surveyer
Active In SP

Posts: 3,541
Joined: Sep 2010
14-01-2011, 04:37 PM

.ppt   HACKING.ppt (Size: 505.5 KB / Downloads: 812)


Hacking on internet banking
How The hackers attack
Steps for Hackers
What an End-User Needs To Know
How an End-User Can Prevent This
How a Corporation Can Prevent This


Hacking means illegally accessing other people's computer systems for destroying, disrupting or carrying out illegal activities on the network or computer systems

How The Hackers Attack

Here’s how it’s done:
The hacker goes to coffee shop and connects to the same Wi-Fi network you are connected to. He runs a series of utilities to redirect other user’s data through his machine. He runs a number of other utilities to sniff the data, act as an SSL Certificate Server and to be the Man-the-Middle. The following diagram shows a very simplified graphic of how your SSL Banking session should work under normal conditions, then how it would work during an attack:

First step
After that, he’ll want to direct your Wi-Fi network traffic to his machine instead of your data traffic going directly to the Internet. between your machine and the Internet. Using Arpspoof, a real easy way to do this, he determines your IP address is and the Default Gateway of the Wi-Fi network is

Second step
The data is now decrypted and he runs a Cat command to view the now decrypted SSL information. Note that the username is “Bankusername” and the password is “BankPassword”.
this dump also shows that the Banking site as National City. connecting to the page where you enter the sensitive information such as bank login credentials or credit card numbers.
The reason for this is to stop the MITM-type attack. How this helps is that if you were to access this preceeding page first with a "fake" certificate and then proceeded to the next page where you were to enter the sensitve information, that page where you would enter the sensitive information would not display.
expecting a valid certificate, which it would not receive because of the Man-in-the-Middle. While some online banks and stores do implement this extra step/page for security reasons, the real flaw in this attack is the uneducated end-user, as you'll soon see:

Third step
With this information, he can now log into your Online Banking Account with the same access and privileges as you. He could transfer money, view account data, etc.
Below is an example of a sniffed SSL credit card transaction. You can see that Elvis Presley was attempting to make a purchase with his credit card 5440123412341234 with an expiration date of 5/06 and the billing address of Graceland in Memphis, TN (He is alive!). If this was your information, the hacker could easily make online purchases with your card.

What an End-User Needs To Know
There’s a big step and end-user can take to prevent this from taking place. When the MITM Hacker uses the “bad” certificate instead of the “good”, valid certificate, the end-user is actually alerted to this. The problem is that most end-users don’t understand what this means and will unknowingly agree to use the fake certificate. Below is an example of the Security Alert an end-user would receive. Most uneducated end-users would simply click “Yes”… and this is the fatal flaw:

How an End-User Can Prevent This
Again, the simple act of viewing the certificate and clicking “No” would have prevented this from happening.
Education is the key for an end-user. If you see this message, take the time to view the certificate. As you can see from the examples above, you can tell when something doesn’t look right. If you can’t tell, err on the side of caution and call your Online Bank or the Online store.
Take the time to read and understand all security messages you receive. Don’t just randomly click yes out of convenience.

How a Corporation Can Prevent This

Educate the end-user on the Security Alert and how to react to it.
Utilize One Time Passwords, such as RSA Tokens, to prevent the reuse of sniffed credentials.
When using SSL VPN, utilize mature products with advanced features, such as Juniper’s Secure Application Manager or Network Connect functionality


This type of attack is relatively easy to do in a public Wi-Fi hotspot environment. It could also easily happen on a home Wi-Fi network, if that Wi-Fi network isn’t properly configured and allows a hacker to connect to that home network. An educated end-user and sound security practices by corporations can protect your valuable data.

seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
29-03-2011, 12:38 PM

.ppt   seminar-1.ppt (Size: 43 KB / Downloads: 522)
What is hacking?
How to translate the hackers’ language
Who is hacker?

• Hack
– Cut with repeated irregular blows
– Examine something very minutely
• Hacker
– The person who hacks
• Cracker
– System intruder/destroyer
• Hacker means cracker nowadays
– Meaning has been changed
History of hacking
• Telephone hacking
– Use telephone freely
– It’s called phreaking
• Computer virus
– Destroy many computers
• Network hacking
– Hack the important server remotely and destroy/modify/disclose the information
Types of hacking
Hacking accidents

• Internet Worm
– Robert T. Morris made an internet worm. It spread through the internet and crashed about 6000 systems.
• Cuckoo’s Egg
– Clifford Stoll caught the hackers who are the German hackers applied by KGB
• IP Spoof
– Kevin Mitnick was caught by Tsutomu Shimomura who was security expert. Kevin Mitnick uses the IP Spoof attack in this accident
Why do hackers hack?
• Just for fun
• Show off
• Hack other systems secretly
• Notify many people their thought
• Steal important information
• Destroy enemy’s computer network during the war
What do hackers do after hacking?
• Patch security hole
– The other hackers can’t intrude
• Clear logs and hide themselves
• Install rootkit ( backdoor )
– The hacker who hacked the system can use the system later
– It contains trojan ls, ps, and so on
• Install irc related program
– identd, irc, bitchx, eggdrop, bnc
• Install scanner program
– mscan, sscan, nmap
• Install exploit program
• Install denial of service program
• Use all of installed programs silently
What do hackers know?
• Don’t know how to use vi
• Don’t know what unix is
• Don’t know what they do
• Know how to intrude the system
• Know how to crash the system
• Know where the hacking programs are
How can kid hack?
• Kid has much of time
– Kid can search for longer time than other people
• All hacking program is easy to use
• Kid doesn’t have to know how the hacking program works
• These kids are called script kiddies
Why can’t Korean kid hack?
• Almost all Korean kids don’t know English well
• Almost all hacking program manuals are written in English
– However, many hacking program manuals are being translated
How can be a real hacker?
• Study C/C++/assembly language
• Study computer architecture
• Study operating system
• Study computer network
• Examine the hacking tools for a month
• Think the problem of the computer
Why can’t defend against hackers?
• There are many unknown security hole
• Hackers need to know only one security hole to hack the system
• Admin need to know all security holes to defend the system
How can protect the system?
• Patch security hole often
• Encrypt important data
– Ex) pgp, ssh
• Do not run unused daemon
• Remove unused setuid/setgid program
• Setup loghost
• Use switch hub
• Setup firewall
– Ex) ipchains
• Setup IDS
– Ex) snort
• Check unintentional changes
– Ex) tripwire
• How can protect the system? (3)
• Backup the system often
What should do after hacked?
• Shutdown the system
– Or turn off the system
• Separate the system from network
• Restore the system with the backup
– Or reinstall all programs
• Connect the system to the network
• It can be good to call the police
Active In SP

Posts: 2
Joined: Jun 2011
23-06-2011, 04:23 PM

thanks buddy ............................
seminar addict
Super Moderator

Posts: 6,592
Joined: Jul 2011
07-02-2012, 10:06 AM

to get information about the topic hacking full report,ppt and related topic refer the link bellow










seminar ideas
Super Moderator

Posts: 10,003
Joined: Apr 2012
21-05-2012, 02:54 PM


.docx   hacking.docx (Size: 40.65 KB / Downloads: 39)

What is hacking?

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
Due to the mass attention given to blackhat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated. The goal of this website is to introduce people the true philosophy and ethics of hackers, hopefully clearing their name and giving them the social status they deserve.

Basic Hacking Skills
Learn how to program.

This, of course, is the fundamental hacking skill. If you don't know any computer languages, I recommend starting with Python. It is cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful and flexible and well suited for large project and implimentations. I have written a more detailed evaluation of Python. Good tutorials are available at the Python web site.
I used to recommend Java as a good language to learn early, but this critique has changed my mind (search for “The Pitfalls of Java as a First Programming Language” within it). A hacker cannot, as they devastatingly put it “approach problem-solving like a plumber in a hardware store”; you have to know what the components actually do. Now I think it is probably best to learn C and Lisp first, then Java.
There is perhaps a more general point here. If a language does too much for you, it may be simultaneously a good tool for production and a bad one for learning. It's not only languages that have this problem; web application frameworks like RubyOnRails, CakePHP, Django may make it too easy to reach a superficial sort of understanding that will leave you without resources when you have to tackle a hard problem, or even just debug the solution to an easy one.
If you get into serious programming, you will have to learn C, the core language of Unix. C++ is very closely related to C; if you know one, learning the other will not be difficult. Neither language is a good one to try learning as your first, however. And, actually, the more you can avoid programming in C the more productive you will be.

Get one of the open-source Unixes and learn to use and run it.
I'll assume you have a personal computer or can get access to one. (Take a moment to appreciate how much that means. The hacker culture originally evolved back when computers were so expensive that individuals could not own them.) The single most important step any newbie can take toward acquiring hacker skills is to get a copy of Linux or one of the BSD-Unixes or OpenSolaris, install it on a personal machine, and run it.
Yes, there are other operating systems in the world besides Unix. But they're distributed in binary — you can't read the code, and you can't modify it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast.

Learn how to use the World Wide Web and write HTML.
Most of the things the hacker culture has built do their work out of sight, helping run factories and offices and universities without any obvious impact on how non-hackers live. The Web is the one big exception, the huge shiny hacker toy that even politicians admit has changed the world. For this reason alone (and a lot of other good ones as well) you need to learn how to work the Web.
This doesn't just mean learning how to drive a browser (anyone can do that), but learning how to write HTML, the Web's markup language. If you don't know how to program, writing HTML will teach you some mental habits that will help you learn. So build a home page. Try to stick to XHTML, which is a cleaner language than classic HTML. (There are good beginner tutorials on the Web; here's one.)

seminar flower
Super Moderator

Posts: 10,120
Joined: Apr 2012
26-05-2012, 01:03 PM


.ppt   HACKING.ppt (Size: 1.34 MB / Downloads: 42)


Hacking became a buzzword for the world of security.
Unauthorized access of information
Hacker: enthusiastic and intelligent programmer
Cracker: misuser of his knowledge


Process of retrieving passwords
What a cracker do?
Concentrating on infrastructure and applications
Common approach: Brute-force
Vulnerability of passwords


Secure, Centralized Repository of Passwords.
Manage shared administrative passwords.
Role based access control for users.
Ad/ldap integration.
Enforcement of password policies.
Remote password synchronization.
Auditing all user access to passwords.
Personal password management for users.
Access through any web browser.


Who ever the cause for this problem whether user, organization, or cracker we should secure our-self with the un authorized activity of cracking.
seminar ideas
Super Moderator

Posts: 10,003
Joined: Apr 2012
27-06-2012, 10:46 AM

to get information about the topic"hacking" full report ppt and related topic refer the link bellow




Thinking To Register

01-09-2012, 06:17 PM

Thinking To Register

31-05-2013, 09:22 AM

Is it a possible seminar and presentation topic for electronics and communication ????

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  web spoofing full report computer science technology 13 9,011 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  ethical hacking research paper pdf jaseelati 0 239 31-01-2015, 01:48 PM
Last Post: jaseelati
  ethical hacking advantages and disadvantages pdf jaseelati 0 281 17-01-2015, 03:50 PM
Last Post: jaseelati
  android full report computer science technology 57 73,217 24-09-2014, 05:05 PM
Last Post: Michaelnof
  steganography full report project report tiger 23 25,788 01-09-2014, 11:05 AM
Last Post: computer science crazy
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,700 13-05-2014, 10:16 AM
Last Post: seminar project topic
Video Random Access Memory ( Download Full Seminar Report ) computer science crazy 2 2,418 10-05-2014, 09:44 AM
Last Post: seminar project topic
Brick Virtual keyboard (Download Full Report And Abstract) computer science crazy 37 31,030 08-04-2014, 07:07 AM
Last Post: Guest
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,152 24-03-2014, 02:51 PM
Last Post: seminar project topic
  eyeOS cloud operating system full report seminar topics 8 11,474 24-03-2014, 02:49 PM
Last Post: seminar project topic