1. Home >
  2. Apps >
  3. Groups >

Project Topics related to ethical hacking

Question asked by Soumyadeep De in #Hacking and Security on Nov 26, 2018
Soumyadeep De
Soumyadeep De · Nov 26, 2018
Rank E2 - BEGINNER

Hello, I'm a final year student and I want to submit my project on ethical hacking, as I'm new to this fields I  don't have any ideas. Can you guys help me by providing a project idea related to ethical hacking? I have 5members in my group. So please give me a good idea for doing a standard project. I have 3 months time for the project. Please help me.

Posted in: #Hacking and Security
Vinay Mishra
Vinay Mishra · Jan 11, 2020
Rank B2 - LEADER

Sorry, I am too late to help you. But can help others who're reading this thread.

Following is the list of projects based on security/hacking:

1) Encoder-Decoder: A program that can encode any message and also able to decode that. 

2) Cryptography: An algorithm project based on cryptography that can encrypt any credential information in any website.

3) Keylogger: You can make a keylogger that can record all inputs in the system or the internet.

4) Exhauster: You can make a virus program that can exhaust the whole data of the system.

5) Offline data stealer: You can make a tool program that can steal data from a system that is not connected to the internet.

Durgesh Srivastava
Durgesh Srivastava · Feb 17, 2020
Rank C1 - EXPERT

Some project ideas related to ethical hacking are-

Web Server Fingerprinting tool.

IP Spoofing attack demonstration.

ARP Spoofing attack and demonstration.

ICMP Flood attack simulation.

Mac flooding attack demonstration and mitigation.

bill yorke
bill yorke · Feb 17, 2020
Rank C2 - EXPERT

consider areas/ ideas such as:

  1. Project & Case study Help 
  2. Web Server Fingerprinting tool.
  3. IP Spoofing attack demonstration.
  4. ARP Spoofing attack and demonstration.
  5. ICMP Flood attack simulation.
  6. Mac flooding attack demonstration and mitigation.
  7. ARP cache poisoning and man in the middle attack.
  8. ICMP based attacks.

You must log-in or sign-up to reply to this post.

Click to Log-In or Sign-Up