SlideShare a Scribd company logo
1 of 10
NETWORK SECURITY
SYSTEM
BY : Shrey Gupta ( jiit, Noida )
Enrol no. : 9911103560
INTRODUCTION
 The project entitled with “Network Security System” is related to hacking attacks in
computer systems over internet. In today’s world many of the computer systems and
servers are not secure because of increasing the hacking attacks or hackers with growing
information, so information security specialist’s requirement has gone high. The project
done is implemented to explain and demonstrate by finding weak security points in the
systems and major security attacks.
 This project designed with “Shell Scripting” on “Red Hat Enterprise Linux” operating
system and also tested with “Backtrack” operating system.
 phases of attacks includes to study the possible security threats are Reconnaissance,
scanning, gaining access, maintaining access and covering attacks. These phases can be
elaborated in detail by many security exploit modules like information gathering, network
scanning, system hacking, firewall, packet sniffing, cryptography and some major attacks
like Dos attack, Arp spoof, DNS poisoning and phishing attacks. All the security modules
studied in detail and done with implementation and testing over so many systems with
some inbuilt and built Linux tools and bash shell scripting.
CURRENT/OPEN PROBLEMS
 In computer Security, Internet security is generally becoming a top priority for both
businesses and governments. Data sent over the Internet—from personal e-mail messages
to online shopping orders—travel through an ever-changing series of computers and
network links. As a result, unscrupulous hackers and scam artists have opportunities to
intercept and change the information. Good Network security protects the critical and
important data from hacker and unauthorized access of the system.
 A well-known cause of computer problems is viruses, or damaging programs that are
introduced to computers or networks. Some viruses rewrite coding to make software
programs unusable, while others scramble or destroy data. Many viruses spread quickly
and operate subtly, so they may not be noticed until the damage has already been done.
 Several hacking incidents have rocked the technology and internet world recently. In
today's modern world, with the prolific use of computers and high-tech software’s, modern-
day hacking too has become somewhat of a phenomenon. The latest malware cause
damages in millions, private data gets hacked and millions of customer information
accounts compromised.
OVERVIEW OF PROPOSED SOLUTION
 Phases of an Attack:
 If you need to apply countermeasures, first you need to understand the phases of an attack.
It is necessary to comprehend the steps to counter an attack once it is detected, and stop the
attack before it reaches the next phase. In general, there are five phases that make up an
attack:
 1. Reconnaissance: The attacker gathers information about a target using active or passive
means.
 2. Scanning: The attacker begins to actively probe the target for vulnerabilities that can be
exploited.
 3. Gaining Access: If a vulnerability is detected, the attacker exploits it to gain access to
the system.
 4. Maintaining Access: Once access is gained, the attacker usually maintains access to
fulfill the goal of the attack.
 5. Covering Tracks: The attacker tries to destroy all evidence of the attack
IMPLEMENTATION DETAILS
Foot-printing
 Foot-printing is basically collecting information about victim. Before collecting information
about victim, it is also essential to know the information about our own system so as to remain
hidden during/after the attack. Different available options are mac and IP (to know one's own
mac address and ip address and different networks to which the system is connected), users
(logged into the system and their uptime), network restart (to restart network), ping (to know if a
system is up or not in a particular network), port scan (to know the active ports of the system
which is up). Command used are ipconfig, uptime, whoami, ping and nc. First four help hacker
in remaining anonymous and gives details about his/her system's details while the next two
options gather information about other users on the network.
Network Scanning
 The following part of the tool is very important phase of attack since it is responsible for
finding open ports on system which are up. Ping sweep is an important scanning command
since it deletes the traces so that the scanner remains undetected. TCP and UDP are useful
when one wants to scan only TCP or only UDP ports. Port Scan is useful for scanning a
particular port only. Of all the scanning options all information is useful one, since it can
deduct many useful information about the victim's operating system and version of the
services running on the victim's system. Nmap utility is used to perform scanning.
Sniffing
 TCP Dump, Wireshark and ARPspoof are the options provided in this section. ARPspoof is
required on LAN for sniffing. Under the TCP dump option again options like sniffing from
a single protocol, port, source, destination, saving packets for a letter analysis.
 Using TCP dump, data which is traveling between two systems can be read in a human
readable format and it can be useful to hack the systems of the network.
Firewalls
 Applying proper rule-set to protect one's system against cracker is one of the main
idea of ethical hacker. Firewall are most helpful tool to prevent unnecessary
connections and accepting packets from unknown systems. The option built with the
tool are viewing IP rules, flushing (deleting current ip rules), setting rule for a source
IP/destination IP for a particular port, closing Internet connection for an IP which is
being forwarded through hacker's system, limiting number of connections, deleting a
particular rule and saving current ip-table (for future use). 'iptables' is the in-built tool
used here to create firewall. Using firewall connections from particular IP or mac
addresses can be controlled to secure the system.
Back-door
 Back-door is used to open port on remote system so that hacker can control remote system
from his system. It is also used to create Trojan. Trojans enter system and opens a back-
door for virus to enter into system and carry out its work stealthily. Here 'nc' command is
used to create connection on new port and listen to the port so that commands can be given
from a remote location.
System Hacking
 System hacking mainly deals with hacking a system to which we have a physical access.
Sometimes, we do have a physical access to a system but due to password and encryption
we are not able to access the data on the system. Here, we require mainly to crack
passwords to hack into system. So, in this module, password cracking is the main focus.
LIMITATIONS OF THE SOLUTION
 It works only on Linux and it encompasses the basic tools only.
 Need of choosing the right software model to implement the idea.
 The decision of making open source software requires detailed analysis and understanding
of the requirements.
 Latest hardware are incompatible, so we have to rely on third-party drivers
FINDINGS
 Security Exploitation has always a scope in the future market of the world since more and
more data is being generated and the need for data security has never been higher.
 Network Security is faced with the biggest issue of hacking the information.
 Security is not only at data level. It can be at communication level, at the time of file
transferring, identity theft, and many more.
 Network Security has to be the top priority for any developer planning for a secured
network and various protocols and norms must be followed.
CONCLUSION
 This project gave me a thorough learning and practice of bash shell scripting, linux
commands and implementation and theory of hacking. The structured pattern followed
throughout the tool made me understand the need of choosing right software model to
implement the idea or algorithm.
 The downside of this project is that it works only on Linux and it encompasses the basic
tools only. Many advanced tools are required in today’s environment to make the task of
hacker easier.
 . Overall my experience with the project was enriching and pleasant which has motivated
me to do further learning in this branch of computer science.

More Related Content

What's hot

Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project ReportRaghav Bisht
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Eng. Mohammed Ahmed Siddiqui
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksInformation Technology
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecErfan Mallick
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkEng. Mohammed Ahmed Siddiqui
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptxKhappiyo
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESTrinity Dwarka
 
Talk28oct14
Talk28oct14Talk28oct14
Talk28oct14mjos
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilitiesphanleson
 

What's hot (16)

Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...Intrusion detection and prevention system for network using Honey pots and Ho...
Intrusion detection and prevention system for network using Honey pots and Ho...
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
Talk28oct14
Talk28oct14Talk28oct14
Talk28oct14
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Banner grabbing
Banner grabbingBanner grabbing
Banner grabbing
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 

Similar to Final project.ppt

Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)Wail Hassan
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)Wail Hassan
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guideMatt Ford
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecCMR WORLD TECH
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayKaren Oliver
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Tiffany Sandoval
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingRaghav Bisht
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullahpongada123
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesAmit Kumbhar
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...IJCNCJournal
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....Research Publish Journals (Publisher)
 

Similar to Final project.ppt (20)

Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
Hacking
HackingHacking
Hacking
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Open port vulnerability
Open port vulnerabilityOpen port vulnerability
Open port vulnerability
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullah
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 

Final project.ppt

  • 1. NETWORK SECURITY SYSTEM BY : Shrey Gupta ( jiit, Noida ) Enrol no. : 9911103560
  • 2. INTRODUCTION  The project entitled with “Network Security System” is related to hacking attacks in computer systems over internet. In today’s world many of the computer systems and servers are not secure because of increasing the hacking attacks or hackers with growing information, so information security specialist’s requirement has gone high. The project done is implemented to explain and demonstrate by finding weak security points in the systems and major security attacks.  This project designed with “Shell Scripting” on “Red Hat Enterprise Linux” operating system and also tested with “Backtrack” operating system.  phases of attacks includes to study the possible security threats are Reconnaissance, scanning, gaining access, maintaining access and covering attacks. These phases can be elaborated in detail by many security exploit modules like information gathering, network scanning, system hacking, firewall, packet sniffing, cryptography and some major attacks like Dos attack, Arp spoof, DNS poisoning and phishing attacks. All the security modules studied in detail and done with implementation and testing over so many systems with some inbuilt and built Linux tools and bash shell scripting.
  • 3. CURRENT/OPEN PROBLEMS  In computer Security, Internet security is generally becoming a top priority for both businesses and governments. Data sent over the Internet—from personal e-mail messages to online shopping orders—travel through an ever-changing series of computers and network links. As a result, unscrupulous hackers and scam artists have opportunities to intercept and change the information. Good Network security protects the critical and important data from hacker and unauthorized access of the system.  A well-known cause of computer problems is viruses, or damaging programs that are introduced to computers or networks. Some viruses rewrite coding to make software programs unusable, while others scramble or destroy data. Many viruses spread quickly and operate subtly, so they may not be noticed until the damage has already been done.  Several hacking incidents have rocked the technology and internet world recently. In today's modern world, with the prolific use of computers and high-tech software’s, modern- day hacking too has become somewhat of a phenomenon. The latest malware cause damages in millions, private data gets hacked and millions of customer information accounts compromised.
  • 4. OVERVIEW OF PROPOSED SOLUTION  Phases of an Attack:  If you need to apply countermeasures, first you need to understand the phases of an attack. It is necessary to comprehend the steps to counter an attack once it is detected, and stop the attack before it reaches the next phase. In general, there are five phases that make up an attack:  1. Reconnaissance: The attacker gathers information about a target using active or passive means.  2. Scanning: The attacker begins to actively probe the target for vulnerabilities that can be exploited.  3. Gaining Access: If a vulnerability is detected, the attacker exploits it to gain access to the system.  4. Maintaining Access: Once access is gained, the attacker usually maintains access to fulfill the goal of the attack.  5. Covering Tracks: The attacker tries to destroy all evidence of the attack
  • 5. IMPLEMENTATION DETAILS Foot-printing  Foot-printing is basically collecting information about victim. Before collecting information about victim, it is also essential to know the information about our own system so as to remain hidden during/after the attack. Different available options are mac and IP (to know one's own mac address and ip address and different networks to which the system is connected), users (logged into the system and their uptime), network restart (to restart network), ping (to know if a system is up or not in a particular network), port scan (to know the active ports of the system which is up). Command used are ipconfig, uptime, whoami, ping and nc. First four help hacker in remaining anonymous and gives details about his/her system's details while the next two options gather information about other users on the network. Network Scanning  The following part of the tool is very important phase of attack since it is responsible for finding open ports on system which are up. Ping sweep is an important scanning command since it deletes the traces so that the scanner remains undetected. TCP and UDP are useful when one wants to scan only TCP or only UDP ports. Port Scan is useful for scanning a particular port only. Of all the scanning options all information is useful one, since it can deduct many useful information about the victim's operating system and version of the services running on the victim's system. Nmap utility is used to perform scanning.
  • 6. Sniffing  TCP Dump, Wireshark and ARPspoof are the options provided in this section. ARPspoof is required on LAN for sniffing. Under the TCP dump option again options like sniffing from a single protocol, port, source, destination, saving packets for a letter analysis.  Using TCP dump, data which is traveling between two systems can be read in a human readable format and it can be useful to hack the systems of the network. Firewalls  Applying proper rule-set to protect one's system against cracker is one of the main idea of ethical hacker. Firewall are most helpful tool to prevent unnecessary connections and accepting packets from unknown systems. The option built with the tool are viewing IP rules, flushing (deleting current ip rules), setting rule for a source IP/destination IP for a particular port, closing Internet connection for an IP which is being forwarded through hacker's system, limiting number of connections, deleting a particular rule and saving current ip-table (for future use). 'iptables' is the in-built tool used here to create firewall. Using firewall connections from particular IP or mac addresses can be controlled to secure the system.
  • 7. Back-door  Back-door is used to open port on remote system so that hacker can control remote system from his system. It is also used to create Trojan. Trojans enter system and opens a back- door for virus to enter into system and carry out its work stealthily. Here 'nc' command is used to create connection on new port and listen to the port so that commands can be given from a remote location. System Hacking  System hacking mainly deals with hacking a system to which we have a physical access. Sometimes, we do have a physical access to a system but due to password and encryption we are not able to access the data on the system. Here, we require mainly to crack passwords to hack into system. So, in this module, password cracking is the main focus.
  • 8. LIMITATIONS OF THE SOLUTION  It works only on Linux and it encompasses the basic tools only.  Need of choosing the right software model to implement the idea.  The decision of making open source software requires detailed analysis and understanding of the requirements.  Latest hardware are incompatible, so we have to rely on third-party drivers
  • 9. FINDINGS  Security Exploitation has always a scope in the future market of the world since more and more data is being generated and the need for data security has never been higher.  Network Security is faced with the biggest issue of hacking the information.  Security is not only at data level. It can be at communication level, at the time of file transferring, identity theft, and many more.  Network Security has to be the top priority for any developer planning for a secured network and various protocols and norms must be followed.
  • 10. CONCLUSION  This project gave me a thorough learning and practice of bash shell scripting, linux commands and implementation and theory of hacking. The structured pattern followed throughout the tool made me understand the need of choosing right software model to implement the idea or algorithm.  The downside of this project is that it works only on Linux and it encompasses the basic tools only. Many advanced tools are required in today’s environment to make the task of hacker easier.  . Overall my experience with the project was enriching and pleasant which has motivated me to do further learning in this branch of computer science.