PROJECT DESCRIPTION
 Passive Foot Printing is nothing but
gaining the access of the targeted
websites without their knowledge.
 We use different docs for finding
different login panels.
 Illegal strings are used for bypassing
the websites.
 Based on the loopholes in the website
shells can be uploaded
 This illegal strings consists of =,’,/,….etc.
 Inorder to keep the website secure
these type of characters should be made
invalid.
Team members:
Vaishnavi | Supriya
Eswari | Namratha
3
WORKING PROCESS
 Passive footprinting is used to gain unauthorised access to a database .
 SQL injection is an attack type that exploits bad SQL statements.It is a Man-in the-Middle
attack between your SQL server and website server.
 It can be used to bypass login algorithms,retrieve,insert,and update and delete data.
 A good security policy when writing SQL statement can help reduce SQL injection attacks.
 As we are bypassing the website, we know that there are vulnerabilities in the website. So we can
patch the loophole and make the website even more secure.
PROJECT LIFE CYCLE
A picture is worth a thousand words
Insert a picture of your final
design and add breif details.
5 BEFORE BYPASSING AFTER BYPASSING
ANY QUERIES??
vaishnavimadasu728@gmail.com

Passive footprinting

  • 2.
    PROJECT DESCRIPTION  PassiveFoot Printing is nothing but gaining the access of the targeted websites without their knowledge.  We use different docs for finding different login panels.  Illegal strings are used for bypassing the websites.  Based on the loopholes in the website shells can be uploaded  This illegal strings consists of =,’,/,….etc.  Inorder to keep the website secure these type of characters should be made invalid. Team members: Vaishnavi | Supriya Eswari | Namratha
  • 3.
    3 WORKING PROCESS  Passivefootprinting is used to gain unauthorised access to a database .  SQL injection is an attack type that exploits bad SQL statements.It is a Man-in the-Middle attack between your SQL server and website server.  It can be used to bypass login algorithms,retrieve,insert,and update and delete data.  A good security policy when writing SQL statement can help reduce SQL injection attacks.  As we are bypassing the website, we know that there are vulnerabilities in the website. So we can patch the loophole and make the website even more secure.
  • 4.
  • 5.
    A picture isworth a thousand words Insert a picture of your final design and add breif details. 5 BEFORE BYPASSING AFTER BYPASSING
  • 6.