0% found this document useful (0 votes)
28 views6 pages

Email: Brute Force Attack On Secured Mailing System

The document describes a project to develop a secure email system using ASP.NET and C# that protects against brute force password attacks. It includes modules for user management, administration, displaying hackers' IP addresses, capturing webcam photos of hackers, and tracking IP addresses. The proposed system aims to secure emails within an intranet by hiding information and identifying hackers through IP address logging.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views6 pages

Email: Brute Force Attack On Secured Mailing System

The document describes a project to develop a secure email system using ASP.NET and C# that protects against brute force password attacks. It includes modules for user management, administration, displaying hackers' IP addresses, capturing webcam photos of hackers, and tracking IP addresses. The proposed system aims to secure emails within an intranet by hiding information and identifying hackers through IP address logging.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

EMAIL : BRUTE FORCE ATTACK ON SECURED MAILING SYSTEM

ABSTRACT

The project entitled as “Email : Brute Force Attack on Secured Mailing System” is to
design and develop the application package for well secured dynamic application. This
package is originated using front end as ASP.NET, coding C# with SQL Server. This
package requires Visual Studio IDE in the server for processing the WebPages and client
systems requires Windows operating system and one web browser like internet explorer.

A common threat web developer’s face is a password-guessing attack known as a brute force
attack. A brute-force attack is an attempt to discover a password by systematically trying
every possible combination of letters, numbers, and symbols until you discover the one
correct combination that works. If your web site requires user authentication, you are a good
target for a brute-force attack.

In this project provides solutions by using two components mainly Administration


Management and User Management. Access can be restricted to only those manipulates and
perspectives that Administrator. The main objective of this project is to secure enforce by
using IP Address tracking and webcam capturing. End User has manifested by administrators
with the ability to identify and control the state of users logged into the server.

E-Mail dispersion details with the web site that manage the electronic way of communication.
In this project there is a domain connected to intranet through this we can create our own user
id, sends mails to any user and manage inbox. We can view incoming mails and even delete
them. Resume can be stored and changed whenever necessary.

Any mail related report can be viewed through the site. If anecdote of exploiter is being
hacked with the purpose of possibilities searching the password by the plodder, when the
exploiter login the hacker list displays the detail about the plodder with IP address.
THE FOLLOWING MODULES

 Administration progress
 User progress
 Hacker list
 Web cam capture
 IP Address tracker

1.2 MODULE DESCRIPTION

Administration progress:

Administrator owns the overall determination of controls, setting of major objectives, and the
identification of general purposes, guidance, leadership & control of the efforts of the groups
towards some common goals. Admin also have the rights to restricts the users and give the
access justices to the user to register their details.

In this module, include the user registration details. The username and mail id is already
available or not checking this process. The user only accesses the mail within the
organization. The hackers hacking company details that time will send the mail to your id and
password is hacking.

User progress:

User Module states the person should register their entropy, contact details, and login
information. Access can be restricted to only those functions and views that administrator.

User Management is a substantiation feature that provides administrators with the ability to
identify and control the state of users logged into the network. This includes, but is not
limited to, the ability to query and filter users that are currently logged into the network,
manually log out users, and control user login counts and login times.
Hacker list:

If anecdote of exploiter is being hacked with the purpose of possibilities searching the
password by the plodder, when the exploiter login the hacker list displays the detail about the
plodder with IP address. The hacker list sends to the exploiter mail. The hacker list visible the
IP address with hacking time.

Webcam capture:

The hacker photo captures and sends to the exploiter mail. The hacker list visible the hacker
photo with hacking password.

IP address tracker:

Internet Protocol address; a sequence of numbers used to identify a particular computer or


domain name on the Internet or Intranet. IP Tracker dll subscribers can install our optional
Active Tracker which adds the tracking automatically as password hacker.
SYSTEM SPECIFICATION

HARDWARE SPECIFICATION

PROCESSOR : Intel Pentium Dual Core

MOTHERBOARD : Intel 915GVSR chipset board

RAM : 2 GB DDR3 RAM

HARD DISK DRIVE : 500 GB HDD

KEY BOARD : 104 KEYS STANDARD

MOUSE : OPTICAL MOUSE

MONITOR : 15”COLOR MONITOR

SOFTWARE SPECIFICATION

DEVELOPMENT ENVIRONMENT : WINDOWS 7 / 10

FRAMEWORK : .NET FRAMEWORK 4.5

DEVELOPMENT TOOL : VISUAL STUDIO 2012

FRONT END : ASP.NET

CODING LANGUAGE : C#

CONNECTVITY TOOL : ADO.NET

BACK END : SQL SERVER 2008

THIRD PARTY TOOLS : CSS, AJAX, JAVASCRIPT

REPORT : GRID / EXCEL


Existing system
The process, which is followed at present, is an existing system. Nowadays Email Id is being
hacked by the hackers in a relatively short time. The hackers can bypass the web server to
directly attack the database server. We assume that the attacks can neither be detected nor
prevented by the current web server IDS, that hacker may take over the web server after the
attack, and that afterwards they can obtain full control of the web server to launch subsequent
attacks. For example, the hackers could modify the application logic of the web applications,
eavesdrop or hijack other users’ web requests, or intercept and modify the database queries to
steal sensitive data beyond their privileges. Important drawback of existing system is
hacking.

DRAWBACKS OF THE EXISTING SYSTEM

 Manual exploit.
 Security is low.
 A valuable data is lost or eavesdropped.
 Frequent occurrence of hacking
 Accumulations are exfoliated.
 Easily hackers can get the password and reuse the Email
accounts.
 Single server No speed
 Junk mail.

PROPOSED SYSTEM

The system, which is proposed, now is an intranet all the details that are maintained
in the restricted computer network. Once the details are fed into the intranet there is
no need for various persons to deal with separate sections.
Only a single person is enough to maintain all the reports in the intranet. The
security can also be given as per the requirement of the users. It's also help us to find
the hacker in an intrusions with the IP address.

 BENEFITS OF THE PROPOSED SYSTEM


 Fully Hidden from the System.
 Security is assured.
 Perfect Deadlock.
 Maintenance of file is flexible.
 Automatic Lock Down if the password is potential searched
 Hacker list displayed with IP address.
 Hackers cannot get the password.
 User cannot predict spam, compose mail.
 Time is consumed
 Time Management
 User friendly.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy