Email: Brute Force Attack On Secured Mailing System
Email: Brute Force Attack On Secured Mailing System
ABSTRACT
The project entitled as “Email : Brute Force Attack on Secured Mailing System” is to
design and develop the application package for well secured dynamic application. This
package is originated using front end as ASP.NET, coding C# with SQL Server. This
package requires Visual Studio IDE in the server for processing the WebPages and client
systems requires Windows operating system and one web browser like internet explorer.
A common threat web developer’s face is a password-guessing attack known as a brute force
attack. A brute-force attack is an attempt to discover a password by systematically trying
every possible combination of letters, numbers, and symbols until you discover the one
correct combination that works. If your web site requires user authentication, you are a good
target for a brute-force attack.
E-Mail dispersion details with the web site that manage the electronic way of communication.
In this project there is a domain connected to intranet through this we can create our own user
id, sends mails to any user and manage inbox. We can view incoming mails and even delete
them. Resume can be stored and changed whenever necessary.
Any mail related report can be viewed through the site. If anecdote of exploiter is being
hacked with the purpose of possibilities searching the password by the plodder, when the
exploiter login the hacker list displays the detail about the plodder with IP address.
THE FOLLOWING MODULES
Administration progress
User progress
Hacker list
Web cam capture
IP Address tracker
Administration progress:
Administrator owns the overall determination of controls, setting of major objectives, and the
identification of general purposes, guidance, leadership & control of the efforts of the groups
towards some common goals. Admin also have the rights to restricts the users and give the
access justices to the user to register their details.
In this module, include the user registration details. The username and mail id is already
available or not checking this process. The user only accesses the mail within the
organization. The hackers hacking company details that time will send the mail to your id and
password is hacking.
User progress:
User Module states the person should register their entropy, contact details, and login
information. Access can be restricted to only those functions and views that administrator.
User Management is a substantiation feature that provides administrators with the ability to
identify and control the state of users logged into the network. This includes, but is not
limited to, the ability to query and filter users that are currently logged into the network,
manually log out users, and control user login counts and login times.
Hacker list:
If anecdote of exploiter is being hacked with the purpose of possibilities searching the
password by the plodder, when the exploiter login the hacker list displays the detail about the
plodder with IP address. The hacker list sends to the exploiter mail. The hacker list visible the
IP address with hacking time.
Webcam capture:
The hacker photo captures and sends to the exploiter mail. The hacker list visible the hacker
photo with hacking password.
IP address tracker:
HARDWARE SPECIFICATION
SOFTWARE SPECIFICATION
CODING LANGUAGE : C#
Manual exploit.
Security is low.
A valuable data is lost or eavesdropped.
Frequent occurrence of hacking
Accumulations are exfoliated.
Easily hackers can get the password and reuse the Email
accounts.
Single server No speed
Junk mail.
PROPOSED SYSTEM
The system, which is proposed, now is an intranet all the details that are maintained
in the restricted computer network. Once the details are fed into the intranet there is
no need for various persons to deal with separate sections.
Only a single person is enough to maintain all the reports in the intranet. The
security can also be given as per the requirement of the users. It's also help us to find
the hacker in an intrusions with the IP address.