SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3118
OFFTECH TOOL AND END URL FINDER
Sivaprakash S1, Sasitharan S2, Shrisanjaykumaar3, Suresh Kumar P4
1,2,3 Dept. of Electronics and Communication Engineering, Hindusthan College of Engineering And Technology,
Coimbatore ,641 032, Tamil Nadu , India
4Professor, Dept. Of Electronics and Communication Engineering, Hindusthan College of Engineering And
Technology, Coimbatore, 641 032 Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Any online web application that is not properly protected is vulnerabletointernetattacksthesedays. Hackersfromall
around the world can attack your website and steal sensitive data or cause significant damage. Other assaults occur when a user
visits a website, for example. The link contains malicious JavaScript code, which can be used to steal personal information or a
browser session, as well as lead to a variety of scams. Cybercriminalsfrequentlyaddlinkstosensitivewebsites;however, examining
every page on the website for linkages to identity theft is useless, time-consuming, and requires security expertise. Everyone
understands the importance of caution, yet it's all too easy to make a mistake by forging an official email. If the link takes you to a
bogus website, it may be able to gather detailed information about your device. To avoid this, we mustfirstdetermine wherealink
leads before clicking on it. What happens when we click on the link and use a programmer namedOfftechToolandEndURLFinder
to transfer our personal information.
Key Words: Offtech tool, End url finder, To find the end face of the fake url, Detect the link or Url, Find the original end face of
the fake website link direction, detect the direction the link.
1. INTRODUCTION
Everyone understands the importance of caution, yet it's all too easy to make a mistake by forging an official email. If the link
takes you to a bogus website, it may be able to gather detailed information about your device. To avoid this, we must first
determine where a link leads before clicking on it. What happens when we click on the link and use a programmer named
Offtech Tool and End URL Finder to transfer our personal information. For the scope of this study, mitigation againstcommon
attacks on web applications is set, and the webmasterisprovidedwithwaystofindcriminal hierarchylinkstocommunications
developers, research shows the production of web application logs that simplify the process. Analyzing the actions ofexternal
users. obsolete, or illegal. Reduction strategies used with secure coding techniques and criminal detection links for sensitive
information are developed into a variety of strategies. The advanced application has been tested and tested against various
link-based attacks, the results obtained from the test programmer have shown that the websitehassuccessfullyreducedthese
malicious web applications attacks, and finding part of the criminal links into critical information, and the best model result
provided 98.5% accuracy.
2. EXISTING SYSTEM
Web applications Attack is very popular because many organisations are deploying their resources online. From the attackers'
perspective, web applications becomevulnerable victims, which is whycyber attacks are one ofthebiggestthreatsintheonline
security sector. These attackscan lead to disruptive effectssuch as the theft of sensitive information and the removalor editing
of the site.
For the scope of this study, mitigation against common attacks on web applications is set, and the webmaster is provided with
mechanisms to detect criminal hacking links that target social media developers, the study also shows the production of web
application logs that simplify the process of analysing foreign users' actions. , is off-limits, or illegal. Secure coding approaches
are used to build mitigation strategies, and different machine learning algorithms and in-depth learning methods are used to
develop methods of acquiring a criminal link to steal sensitive information.Theadvancedapplicationhasbeentestedandtested
against a variety of attack scenarios, and the results obtained during the testing process have shown that the website has
successfully reduced thisattack on malicious web applications, and that comparisons between differentalgorithmsgetthebest
results in detecting part of the criminal links to steal sensitive information.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3119
Fig -1: Individual relationships, attitudes, and re-visits are all part of the conceptual paradigm.
Apart from these attacks, identity theft is one of the most common social media attacks, with hackers posing as trustworthy
businesses to obtain sensitive and personal information, compromising millions of user records. Log files are used to store
website logs in order to track all users' login attempts since they keep track of events and activities. The following is how the
paper is organised: The section addresses the problem's definition, the most prevalentWeb System Attack,andyourmitigating
options. displays access records, and the use of machine learning and in-depth reading in the finding of ties to the theft of
sensitive information is discussed.
3. PROPOSED SYSTEM
Web Hackers fromall aroundthe world canattackyourwebsiteandstealsensitivedataorcausesignificantharm.Otherassaults
occur when a person visits a website, for example. The link contains malicious JavaScript code, which may be used to steal
personal information or a browser session, as well as lead to a variety of frauds. Cybercriminals frequently add connections to
sensitive websites; however,examining every page on the websiteforlinkages to identity theft is useless, time-consuming,and
needs security expertise.
Everyoneunderstands the importance of caution, yet it'sall toosimple to make a mistake by forging an official email. If thelink
takes you to a bogus website, it may be able to gather detailed information about your device. To avoid this, we must first
determine where a link leads before clicking on it. What happens when we click on the link, where we transfer our personal
information using a tool called Offtech Tool and End URL Finder.
This programmeis independent since it was built forLinux, Windows, Mac, and alover terminalorcommandpromtthroughout
the arena, and it was also designed for Android.
Fig -2: Block Diagram for offtech tool designed by flask framework
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3120
3. SOFTWARE USED
PyCharm: This application is self-contained since it was created for Linux, Windows, Mac, and any terminal or
command prompt throughout the arena, as well as Android.
Flask is a lightweight Python web framework.
Because they don't require any extra tools or libraries, they're categorised as microframeworks.
It lacks a foundation for webpage summaries, form verification, or any other component where current third- party
libraries provide equivalent functionality.
Flask is a Python web application framework that is used in Werkzeug and Jinja2. The following are some of the
benefits of utilising the Flask framework: A built-in upgrading server is included, as well as a rapid debugger.
Termux is a tool for organising apps downloaded from the Google Play Store (or anywhere else). Activating
applications refers to the process of converting bespoke apps into system apps. This can assist prevent
programmes from shutting in the background and prevent data loss.
A web browser is used for offtech output views designed with a flask framework. Output in HTML and CSS.
EX:- chrome, firefox, Microsoft edge or any other web browser.
4. WORKING PROCESS
The Python Flask Web Framework was used to create this web application. Have you ever wondered what happens when this
connection is broken? The URL route is followed by Offtech Tool & End Url Finder. Allows you to examine the redirect URL's
precise route. It will display a whole URL, shortened link, or sub-URL route redirect.
Fig -3: OffTech tool using Flask framework (in HTML)
Disclosure of Features The following are the essential qualities that have been proved to be successful in detecting identity
theft websites: Phishing is classed as a phishing scam if the domain name URL has an IP address.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3121
URL Length - Long URLs may contain malicious content. If the length of the URL is greater than the average length of the URL,
then it is classified as suspicious or criminal theft of sensitive information.
Fig -4: OffTech in Terminal
It is a Python-based Web application. Have you ever wondered where a link leads. The URL route is being followed by Offtech
Tool & End url Finder. Allows you to examine the redirect URL's precise route. It will provide a comprehensive list of URLs,
shortened links, and sub-URLs that have been redirected.
4. CONCLUSION
The proposed technique with results has shown that the protection scheme works properly with accuracy, sensitivity of this
scheme very high for the abnormal and faulty conditions in the link. OFFTECH TOOL will help to identify or recognize the end
or original face the link or the URL. If the link have any unwanted redirection betweentheoriginal link facetotheserver means
it have some unwanted process may it’s the way to theft your information or your data. so it’s the tool that helps to find the
original direction of link and it shows the end face of that URL or a link which has been you submitted. It helpslotofway inthis
modern network world.
REFERENCES
[1] JAEIL LEE1, YONGJOON LEE2, DONGHWAN LEE3, HYUKJIN KWON4, AND DONGKYOO SHINK “Classification of Attack
Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups”. Received March 30, 2021,acceptedMay
25, 2021, date of publication May 31, 2021, date of current version June 10, 2021.
[2] Ji-Young, L. J. In, and K. K. Gon, ``The all-purpose sword: North Korea's cyber operations and strategies,'' in Proc. 11th Int.
Conf. Cyber Conict (CyCon), Tallinn, Estonia, May 2019, pp. 120.
[3] V. Suganya, ``A review on phishing attacks and various anti phishing techniques,'' Int. J. Computer.Appl.,vol.139,no. 1, pp.
2023,Apr. 2016.
[4] Cybersecurity & Infrastructure SecurityAgency.NorthKoreanAdvancedPersistentThreatFocus:Kimsuky.Accessed:Mar.
31, 2021. [Online].Available: https://us-cert.cisa.gov/ncas/alerts/aa20-301a
[5] K. L. Chiew, K. S. C. Yong, and C. L. Tan, ``A survey of phishing attacks: Their types, vectors and technical approaches,''
Expert Syst. Appl.,vol. 106, pp. 120, Sep. 2018.

More Related Content

Similar to OFFTECH TOOL AND END URL FINDER

Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Colin English
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
ijtsrd
 

Similar to OFFTECH TOOL AND END URL FINDER (20)

Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Securezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing ToolboxSecurezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing Toolbox
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
 
Cyber Investigation Portal
Cyber Investigation PortalCyber Investigation Portal
Cyber Investigation Portal
 
Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)
 
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard AlgorithmIRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
IRJET - Phishing Attack Detection and Prevention using Linkguard Algorithm
 
19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
 
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine Learning
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
 
IRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application Vulnerabilities
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT Infrastructure
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
 
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...IRJET-  	  Underpinning the Impact of Web Application Security on Businesses ...
IRJET- Underpinning the Impact of Web Application Security on Businesses ...
 
Phishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoostPhishing Website Detection Paradigm using XGBoost
Phishing Website Detection Paradigm using XGBoost
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 

OFFTECH TOOL AND END URL FINDER

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3118 OFFTECH TOOL AND END URL FINDER Sivaprakash S1, Sasitharan S2, Shrisanjaykumaar3, Suresh Kumar P4 1,2,3 Dept. of Electronics and Communication Engineering, Hindusthan College of Engineering And Technology, Coimbatore ,641 032, Tamil Nadu , India 4Professor, Dept. Of Electronics and Communication Engineering, Hindusthan College of Engineering And Technology, Coimbatore, 641 032 Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Any online web application that is not properly protected is vulnerabletointernetattacksthesedays. Hackersfromall around the world can attack your website and steal sensitive data or cause significant damage. Other assaults occur when a user visits a website, for example. The link contains malicious JavaScript code, which can be used to steal personal information or a browser session, as well as lead to a variety of scams. Cybercriminalsfrequentlyaddlinkstosensitivewebsites;however, examining every page on the website for linkages to identity theft is useless, time-consuming, and requires security expertise. Everyone understands the importance of caution, yet it's all too easy to make a mistake by forging an official email. If the link takes you to a bogus website, it may be able to gather detailed information about your device. To avoid this, we mustfirstdetermine wherealink leads before clicking on it. What happens when we click on the link and use a programmer namedOfftechToolandEndURLFinder to transfer our personal information. Key Words: Offtech tool, End url finder, To find the end face of the fake url, Detect the link or Url, Find the original end face of the fake website link direction, detect the direction the link. 1. INTRODUCTION Everyone understands the importance of caution, yet it's all too easy to make a mistake by forging an official email. If the link takes you to a bogus website, it may be able to gather detailed information about your device. To avoid this, we must first determine where a link leads before clicking on it. What happens when we click on the link and use a programmer named Offtech Tool and End URL Finder to transfer our personal information. For the scope of this study, mitigation againstcommon attacks on web applications is set, and the webmasterisprovidedwithwaystofindcriminal hierarchylinkstocommunications developers, research shows the production of web application logs that simplify the process. Analyzing the actions ofexternal users. obsolete, or illegal. Reduction strategies used with secure coding techniques and criminal detection links for sensitive information are developed into a variety of strategies. The advanced application has been tested and tested against various link-based attacks, the results obtained from the test programmer have shown that the websitehassuccessfullyreducedthese malicious web applications attacks, and finding part of the criminal links into critical information, and the best model result provided 98.5% accuracy. 2. EXISTING SYSTEM Web applications Attack is very popular because many organisations are deploying their resources online. From the attackers' perspective, web applications becomevulnerable victims, which is whycyber attacks are one ofthebiggestthreatsintheonline security sector. These attackscan lead to disruptive effectssuch as the theft of sensitive information and the removalor editing of the site. For the scope of this study, mitigation against common attacks on web applications is set, and the webmaster is provided with mechanisms to detect criminal hacking links that target social media developers, the study also shows the production of web application logs that simplify the process of analysing foreign users' actions. , is off-limits, or illegal. Secure coding approaches are used to build mitigation strategies, and different machine learning algorithms and in-depth learning methods are used to develop methods of acquiring a criminal link to steal sensitive information.Theadvancedapplicationhasbeentestedandtested against a variety of attack scenarios, and the results obtained during the testing process have shown that the website has successfully reduced thisattack on malicious web applications, and that comparisons between differentalgorithmsgetthebest results in detecting part of the criminal links to steal sensitive information.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3119 Fig -1: Individual relationships, attitudes, and re-visits are all part of the conceptual paradigm. Apart from these attacks, identity theft is one of the most common social media attacks, with hackers posing as trustworthy businesses to obtain sensitive and personal information, compromising millions of user records. Log files are used to store website logs in order to track all users' login attempts since they keep track of events and activities. The following is how the paper is organised: The section addresses the problem's definition, the most prevalentWeb System Attack,andyourmitigating options. displays access records, and the use of machine learning and in-depth reading in the finding of ties to the theft of sensitive information is discussed. 3. PROPOSED SYSTEM Web Hackers fromall aroundthe world canattackyourwebsiteandstealsensitivedataorcausesignificantharm.Otherassaults occur when a person visits a website, for example. The link contains malicious JavaScript code, which may be used to steal personal information or a browser session, as well as lead to a variety of frauds. Cybercriminals frequently add connections to sensitive websites; however,examining every page on the websiteforlinkages to identity theft is useless, time-consuming,and needs security expertise. Everyoneunderstands the importance of caution, yet it'sall toosimple to make a mistake by forging an official email. If thelink takes you to a bogus website, it may be able to gather detailed information about your device. To avoid this, we must first determine where a link leads before clicking on it. What happens when we click on the link, where we transfer our personal information using a tool called Offtech Tool and End URL Finder. This programmeis independent since it was built forLinux, Windows, Mac, and alover terminalorcommandpromtthroughout the arena, and it was also designed for Android. Fig -2: Block Diagram for offtech tool designed by flask framework
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3120 3. SOFTWARE USED PyCharm: This application is self-contained since it was created for Linux, Windows, Mac, and any terminal or command prompt throughout the arena, as well as Android. Flask is a lightweight Python web framework. Because they don't require any extra tools or libraries, they're categorised as microframeworks. It lacks a foundation for webpage summaries, form verification, or any other component where current third- party libraries provide equivalent functionality. Flask is a Python web application framework that is used in Werkzeug and Jinja2. The following are some of the benefits of utilising the Flask framework: A built-in upgrading server is included, as well as a rapid debugger. Termux is a tool for organising apps downloaded from the Google Play Store (or anywhere else). Activating applications refers to the process of converting bespoke apps into system apps. This can assist prevent programmes from shutting in the background and prevent data loss. A web browser is used for offtech output views designed with a flask framework. Output in HTML and CSS. EX:- chrome, firefox, Microsoft edge or any other web browser. 4. WORKING PROCESS The Python Flask Web Framework was used to create this web application. Have you ever wondered what happens when this connection is broken? The URL route is followed by Offtech Tool & End Url Finder. Allows you to examine the redirect URL's precise route. It will display a whole URL, shortened link, or sub-URL route redirect. Fig -3: OffTech tool using Flask framework (in HTML) Disclosure of Features The following are the essential qualities that have been proved to be successful in detecting identity theft websites: Phishing is classed as a phishing scam if the domain name URL has an IP address.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3121 URL Length - Long URLs may contain malicious content. If the length of the URL is greater than the average length of the URL, then it is classified as suspicious or criminal theft of sensitive information. Fig -4: OffTech in Terminal It is a Python-based Web application. Have you ever wondered where a link leads. The URL route is being followed by Offtech Tool & End url Finder. Allows you to examine the redirect URL's precise route. It will provide a comprehensive list of URLs, shortened links, and sub-URLs that have been redirected. 4. CONCLUSION The proposed technique with results has shown that the protection scheme works properly with accuracy, sensitivity of this scheme very high for the abnormal and faulty conditions in the link. OFFTECH TOOL will help to identify or recognize the end or original face the link or the URL. If the link have any unwanted redirection betweentheoriginal link facetotheserver means it have some unwanted process may it’s the way to theft your information or your data. so it’s the tool that helps to find the original direction of link and it shows the end face of that URL or a link which has been you submitted. It helpslotofway inthis modern network world. REFERENCES [1] JAEIL LEE1, YONGJOON LEE2, DONGHWAN LEE3, HYUKJIN KWON4, AND DONGKYOO SHINK “Classification of Attack Types and Analysis of Attack Methods for Profiling Phishing Mail Attack Groups”. Received March 30, 2021,acceptedMay 25, 2021, date of publication May 31, 2021, date of current version June 10, 2021. [2] Ji-Young, L. J. In, and K. K. Gon, ``The all-purpose sword: North Korea's cyber operations and strategies,'' in Proc. 11th Int. Conf. Cyber Conict (CyCon), Tallinn, Estonia, May 2019, pp. 120. [3] V. Suganya, ``A review on phishing attacks and various anti phishing techniques,'' Int. J. Computer.Appl.,vol.139,no. 1, pp. 2023,Apr. 2016. [4] Cybersecurity & Infrastructure SecurityAgency.NorthKoreanAdvancedPersistentThreatFocus:Kimsuky.Accessed:Mar. 31, 2021. [Online].Available: https://us-cert.cisa.gov/ncas/alerts/aa20-301a [5] K. L. Chiew, K. S. C. Yong, and C. L. Tan, ``A survey of phishing attacks: Their types, vectors and technical approaches,'' Expert Syst. Appl.,vol. 106, pp. 120, Sep. 2018.