Adil Khan 10 months ago
AdiKhanOfficial #FYP Ideas

Ethical Hacking Tools Techniques and Practices

Cyber security is a vital key towards communication and other security problems. Now a normal computer is not safe even when not connected over the Internet. For the side of hackers, they are both in positive and negative roles of a cyber-incident. The positive way is to think like a negative one an

Project Title

Ethical Hacking Tools Techniques and Practices

Project Area of Specialization

Cyber Security

Project Summary

Cyber security is a vital key towards communication and other security problems. Now a normal computer is not safe even when not connected over the Internet. For the side of hackers, they are both in positive and negative roles of a cyber-incident. The positive way is to think like a negative one and generate a secure environment between hackers and databases or another system. This project explores the hacking tools, techniques and practices. Different tools will be utilized based on specific security scenarios to develop and test our proposed solutions. In addition, guidelines will be provided to mitigate different kinds of attacks as well as vulnerabilities which can lead towards attacks. Finally, this project will help community to protect their precious data from such kind of attacks.

Project Objectives

  • In this project we will discuss different types of hacking, hackers, threats,vulnerabilities, and study in detail Ethical Hacking tools, techniques, and practices.
  • The main idea of the project is to explore hacking-related tools that will provide the weakness of a product/system.
  • In this way, other stakeholders can make a new environment that will be safer and out of those weaknesses.
  • Categorize tools/techniques where every computer program has some intensity level according to a hacking attack.
  • Provide a tool/technique for secure and resilient cyber systems for cybersecurity and response.
  • Assault hacking attack on system in close environment.
  • Develop an attack model and execute it in our developed network.
  • Detect attack through using of multiple open-source tools and techniques and provide mitigation techniques.

Project Implementation Method

  • Perform detailed research to identify the tools and techniques.
  • Develop attack model.
  • Assort attack in the network.
  • Detect attack and provide recovery mechanism.
  • Provide mitigation technique.

Benefits of the Project

This project holds a key role for practices of hacking and awareness for community to verify and counter these kinds of attacks in the future. Generally, first case of project is just random hacking attack. Cyberspace facing substantial DDoS attacks and it starts with tracking of device and then launch an attack against that device. Similarly, ransomware attacks are also very common and there are numerous examples where organizations have lost their precious data. Such attacks need to be protected which will be great help for community. This project aims to develop a mechanism which will detect, implement and provide mitigations against such attacks.

Technical Details of Final Deliverable

  • Develop a computer network and assort attack in it.
  • Detect attack in the network and provide a recovery mechanism.
  • Provide mitigation technique to avoid such attacks.
  • The software application will be provided to detect and mitigate attacks.

Final Deliverable of the Project

HW/SW integrated system

Core Industry

IT

Other Industries

Core Technology

Others

Other Technologies

Cloud Infrastructure

Sustainable Development Goals

Industry, Innovation and Infrastructure

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Switch 24P Equipment15000050000
Network Cables Equipment11000010000
Punching Tool Equipment180008000
Rj 45 Equipment210002000
printing Miscellaneous 105005000
Stationery Miscellaneous 202505000
Total in (Rs) 80000
If you need this project, please contact me on contact@adikhanofficial.com
Real time solar generation and electric comsumption logger of 85kwp gr...

SUMMARY: The purpose of making this project to find the real time solar generation & e...

1675638330.png
Adil Khan
10 months ago
Design of 3KW hybrid inverter with Power Factor Correction(PFC) and pr...

A switched mode power supply (SMPS) is a type of power supply that uses semiconductor swit...

1675638330.png
Adil Khan
10 months ago
Reward Earning Android App

Welcome This is basically rewardable earning App in which user can get reward by performin...

1675638330.png
Adil Khan
10 months ago
Stale Fruit Detection through image processing and considering gas emi...

People Nowadays are busy and they don't bother keeping care for less important thing in th...

1675638330.png
Adil Khan
10 months ago
Autonomous Car Using Raspberry pi

The purpose of our project is to create an autonomous car which should be able to drive au...

1675638330.png
Adil Khan
10 months ago