0% found this document useful (0 votes)
167 views15 pages

Prepare Report On Trojan Attack

This document is a micro project report submitted by student Pinil Baburav Chakar to study Trojan attacks. The 3-page report includes an introduction describing the aim to study and identify a Trojan attack. It describes completing the intended course outcomes of detecting vulnerabilities, describing ethical hacking processes, and comparing digital forensic investigation models. The methodology, resources used, and skills developed are outlined. The applications of learning about Trojan attacks to prevent cyberattacks are discussed. In conclusion, the student thanks the reader.

Uploaded by

chakarpinil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
167 views15 pages

Prepare Report On Trojan Attack

This document is a micro project report submitted by student Pinil Baburav Chakar to study Trojan attacks. The 3-page report includes an introduction describing the aim to study and identify a Trojan attack. It describes completing the intended course outcomes of detecting vulnerabilities, describing ethical hacking processes, and comparing digital forensic investigation models. The methodology, resources used, and skills developed are outlined. The applications of learning about Trojan attacks to prevent cyberattacks are discussed. In conclusion, the student thanks the reader.

Uploaded by

chakarpinil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Subject name and code: ETI (22618) Academic Year: 2023-24

Couse Name: IF6I Semester: SIX

A STUDY ON
PREPARE REPORT ON TROJAN ATTACK
MICRO PROJECT REPORT
Submitted in May 2024 by the group of 1 student

Sr. Roll No. Full Name of Students Enrollment Seat No.


No. (sem-6) No. (semester-6)
1 53 PINIL BABURAV CHAKAR 2209350316

Under the Guidance of


PROF. MS. SHEETAL DESHMUKH
In
Diploma Board of Technical Education,
ISO 9001:2008 (ISO/IEC-27001:201
SHIVAJIRAO S. JONDHALE POLYTECHNIC, ASANGOAN

1
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION,
MUMBAI

CERTIFICATES

This is to certify that Mr. PINIL BABURAV CHAKAR Roll No: 53 of Six
Semester of Information Technology Programme in Engineering &
Technology at Shivajirao. S Jondhale Polytechnic Asangaon (EAST) Shahapur
421601 has completed the Micro Project Satisfactorily in Subject: ETI
In the academic Year 2024 as, prescribed curriculum of I Scheme.

Place: ASANGOAN Enrollment No: 2209350316


Date: / /2024 Exam Seat No:

Project Guide Head of Department


Principal

Seal of
institute

-:Index:-

2
Sr. No. CONTENTS Page No.

Aim of the Micro-Project


1 4

Rationale
2 5

Course Outcomes Achieved


3 5

Literature Review
4 5

Actual Methodology Followed


5 6

Actual Resources Used


6 7

Skills Developed
7 13

Applications of Micro Project


8 13

Annexure - I

Micro-Project Proposal

3
1.0 Aim of the Micro-Project:
Aim of the project is to Study any Trojan attack, Identify the Trojan
attack.

2.0 Intended Course Outcomes:


a) Detect Network, Operating System and applications Vulnerabilities.
b) Describe Ethical Hacking Process.
c) Compare Models of Digital Forensic Investigation.

3.0 Proposed methodology:


I. We will focus on the materials we need, as well as the instructions
and sort it out in a manner which will expedite different
responsibilities of the team members.
II. We will study the concept of Trojan attack and types of it.
III. Cross check all the conclusions and answer. IV. Prepare a report on
the topic.
IV.
V.
VI.
VII.
VIII.
IX. Prepare the final report.

Annexure - II

Micro-Project Report

4
1.0 Rationale:

In our computer world, a Trojan Horse is a malicious security breaking


program that is

disguised as something benign. For example, you download what appears to


be a movie or music file, but when you click on it, you unleash a dangerous
program (Trojan horse program is downloaded on your PC) that erases your
disk, sends your credit card numbers and passwords to a stranger, or lets that
stranger hijack your computer to commit illegal attacks.

Nowadays there are so many Trojan Horses .These server-Trojans are


installed on

somebody’s pc and person having that client-Trojan can access & control
somebody’s pc without his knowing. This may be dangerous. So computer
users should know about Trojan viruses and their potential harms to private
data. Users should take care while installing unknown software’s from
internet. So this micro-project is totally based on such Trojan Horse attacks
and this research will be helpful to prevent such cyber-attacks.

2.0 Aim of the Micro-Project:

3.0 Aim of the project is to Study any Trojan attack, Identify the Trojan
attack.

4.0 Course Outcomes Achieved:


a) .

5
5.0 Literature Review:
Operations to be performed on strings:
a) Reversing a given string.
b) Concatenating two strings.

a) Finding length of given string:

Given string to find

b) Reversing a given string:

Given string to reverse: “summer 2017”

c) Concatenating given strings:

Given string to concatenate:

String1: “Maharashtra board”

String2: “of technical Education”

6.0 Actual Methodology Followed:

The aim of the Micro-project is to develop program to find the length of


a string, reverse a string and to concatenate a string.
I.
II. Prepare the final report.

7.0 Actual Resources Used:

Sr. No Resources required Specifications

6
1 Computer system Intel(R) Pentium CPU, RAM 4
GB
2 Operating System Windows 11, 64 Bit Operating
System
3

7.0 Source code of program:

I. ALP

II. ALP to reverse a given string.


Given string to reverse: “summer 2017”

SET M
INT 21H
ENDM

.MODEL SMALL

;****** DATA SEGMENT ******


.DATA

EMPTY DB 10,13, " $"

STR1 DB 25,?,25 DUP('$')


STR2 DB 25,?,25 DUP('$')

MSTRING DB 10,13, "ENTER FIRST STRING: $"


7
MSTRING2 DB 10,13, "ENTER SECOND STRING: $"
MCONCAT DB 10,13, "CONCATENATED STRING: $"

;********** CODE SEGMENT ************

.CODE

START:
MOV AX,@DATA
MOV DS,AX

PRINT MSTRING
CALL ACCEPT_STRING

;STORING STRING IN STR2


PRINT MSTRING2
MOV AH,0AH
LEA DX,STR2
INT 21H

MOV CL,STR1+1 ;LENGTH OF STRING1 IN CL


MOV SI,OFFSET STR1
NEXT: INC SI
DEC CL
JNZ NEXT
INC SI

INC SI
8
MOV DI,OFFSET STR2
INC DI
INC DI

MOV CL,STR2
MOVE_NEXT:

MOV AL,[DI]
MOV [SI],AL
INC SI
INC DI
DEC CL
JNZ MOVE_NEXT

PRINT MCONCAT
PRINT STR1+2

EXIT:
MOV AH,4CH ;EXIT THE PROGRAM
INT 21H

;ACCEPT PROCEDURE
ACCEPT PROC NEAR

MOV AH,01
INT 21H
9
RET
ACCEPT ENDP

DISPLAY1 PROC NEAR

MOV AL,BL
MOV BL,AL
AND AL,0F0H
MOV CL,04
ROL AL,CL

CMP AL,09
JBE NUMBER
ADD AL,07
NUMBER: ADD AL,30H
MOV DL,AL
MOV AH,02
INT 21H

MOV AL,BL
AND AL,00FH
CMP AL,09
JBE NUMBER2
ADD AL,07
NUMBER2: ADD AL,30H
MOV DL,AL
MOV AH,02
INT 21H
RET
DISPLAY1 ENDP

10
ACCEPT_STRING PROC NEAR

MOV AH,0AH ;ACCEPT STRING FROM USER FUNCTION


MOV DX, OFFSET STR1 ; STORE THE STRING IN MEMORY POINTED BY "DX"
INT 21H
RET
ACCEPT_STRING ENDP

END START
END

8.0 Output:

11
Fig. 1.1 Output of ALP for finding string length

Fig. 1.2 Output of ALP for reversing a string

12
Fig. 1.3 Output of ALP for concatenating strings

9.0 Skills Developed:


During the course of this micro-project, we learnt to make Assembly
language
program for different problems.
a) We learnt various syntaxes of Assembly language,
b) We learnt to create algorithm in Assembly language.
c) We also learnt to develop programs in Assembly language.

10.0 Applications of this Micro-project:


This micro-project finds its application in:
a) To find the length of a given string.
b) For reversing a string.
c) For concatenating two strings.

13
1.0 Area of future Improvement:
In future, the program can be modified for using more larger strings, to
find length of larger strings, reversing bigger strings. Also, it can be
modified to concatenate more than two strings.

12.0 Conclusion:
We learn to make programs for different problems in Assembly
language.

14
thank you !!!

15

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy