Date post: | 05-Apr-2018 |
Category: |
Documents |
Upload: | haritha-donthula |
View: | 220 times |
Download: | 0 times |
of 28
8/2/2019 Email Hacking
1/28
EMAIL HACKING
BY
BATCH-03
D.HARITHA 08871A1228D.KEERTHI 08871A1231
K.HEMALATHA 08871A1244
B.SREELATHA 08871A1212
PROJECT GUIDE: N.RAJENDER
PROJECT CO-ORDINATOR: D.RAJASHEKAR
8/2/2019 Email Hacking
2/28
ABSTRACTEmail Hacking is nothing but to hack the userid and password of
the email user.
Email Hacking is used to hack the userid and password of the
email user by developing a fake webpage which looks same as theoriginal webpage. The user enters the details in the fake web form then
the details will be stored in the database .Then by using the details of the
user stored in database the email hacker will enter the user mail inbox by
entering the userid and password, then he can do any malicious
functions.
There are several methods for hacking yahoo, msn or AOL email
accounts. One of these methods is social engineering.
Social engineering consists in the ability to trick someone inbelieving that he is giving information to someone who has the authority
to ask for it.
8/2/2019 Email Hacking
3/28
REQUIREMENT SPECIFICATIONS
Hardware Requirement Specifications(HRS)
Processor Pentium III/IV/Dual Core/Core 2 Duo
RAM 100GB
Hard Disk 128MB or above
8/2/2019 Email Hacking
4/28
Software Requirement Specifications(SRS)
Operating System Windows XP, Windows 7
Technology .NET Framework
Language ASP.NET
Data Base SqlServer 2005
Browser Any web browser IE, Firefox etc.
Server Internet Information Services(IIS)
8/2/2019 Email Hacking
5/28
LITERATURE SURVEY
Existing system:
There are different techniques for E-Mail Hacking. Those are
1. Phishing
2. Keystroke Capturing
a. Hardware Keylogger
b.Software Keylogger3. Password Guessing.
8/2/2019 Email Hacking
6/28
Proposed System:
In this proposed system we are going to simulate the Phishing
in very effective way that the user can fall into the hacking net very
easily. Because we will hack the email by fake form. We use different
fake forms it means we will not use same forms for hacking the email.
8/2/2019 Email Hacking
7/28
SOFTWARE REQUIREMENT SPECIFICATION
1. INTRODUCTION
1.1 Purpose
1.2 Scope
1.3 Definations , Acronyms and Abbrevations
1.4 References
8/2/2019 Email Hacking
8/28
2. The Overall Description
2.1 Product Perspective
2.1.1 Hardware Interfaces
2.1.2 Software Interfaces
2.1.3 Communications Interfaces
2.2 Product Functions
2.3 User Characteristics
2.4 Constraints
8/2/2019 Email Hacking
9/28
3. Specific Requirements
3.1 External interface
3.2 Performance Requirements
Availability
3.3 Logical Database Requirements
3.4 Design Constraints
3.4.1 Standards Compliance
8/2/2019 Email Hacking
10/28
3.5 Software System Attributes
3.5.1Maintainability
3.5.2 Portability
8/2/2019 Email Hacking
11/28
Login
+UserId
+Password
+Login()
+Clear()
New User
+FirstName+LastName
+DOB+Gender
+UserId
+Password
+ConfirmPassword+Country
+Nationality+EmailId
+Submit()+Cancel()
+Back()
Accountarea
Inbox
+frommail+datetime
+subject
+staus
+readmail()
Compose
+tomail+subject
+attachfile
+senmail()
+savemail()
+discard()
Sent Items
+tomail+datetime
+subject
+status
+readsentmail()
+resentmail()
Drafts
+tomail+datetime
+subject
+status
+readsavedmail()
+sendmail()
setting
+Current Password+new password
+re enter password
+submit()
Fig: Class Diagram For user
DESIGNING PHASE
8/2/2019 Email Hacking
12/28
Visit Home page
Logout
Sends & Save Mails
Compose Mail
Login page
Account Area page
Reads Mails from inbox
Exist ing User
Fig: Usecase Diagram for Existing User
8/2/2019 Email Hacking
13/28
Visit Home page
Logout
Sends & Save Mails
Compose Mail
Login page
Account Area page
Reads Mails from inbox
New User Registration
New User
Fig: Usecase Diagram for New User
8/2/2019 Email Hacking
14/28
Logouts from the current page
Existing User Visit HomePage
Login Page AccountareaPage
Reads mailsfrom Inbox
Compose mail Send & Savemail
Logout
Visits home page
Enters login page
Enters into Accountarea page
Reads mails from Inbox
Compose mail
Sends and save mails
Fig: Sequence Diagram For Existing User
8/2/2019 Email Hacking
15/28
Login PageExisting User Visit Home
Page
Accountarea
Page
Reads mails
from Inbox
Compose mail Send & Save
LogoutNew user
Registration
Visits home page
Enters login page
Enters into Accountarea page
Reads mails from Inbox
Compose mail
Sends and save mails
Logouts from the current page
Register for New Userid
Fig: Sequence Diagram for New User
8/2/2019 Email Hacking
16/28
Existing
User
Visit Home
Page
Login
Page
Accountarea
Page
Reads mails from
Inbox
Send & Save
Compose
Logout
1: 2:
3:4:
5:
6:
7:
Fig: Collaboration Diagram for Existing User
8/2/2019 Email Hacking
17/28
Existing
User
Visit Home
Page
Login
Page
Accountarea
Page
Reads mails from
Inbox
Send & Save
Composemail
Logout
1: 2:
4:5:
6:
7:
8:
New user
Registration
3:
Fig: Collaboration Diagram For New User
8/2/2019 Email Hacking
18/28
Home page
login page
sign upEnter userid and
password
Accountpage
inbox compose sent drafts settings logout
Fig: Activity Diagram for user
8/2/2019 Email Hacking
19/28
Fig: DataFlow Diagram
LEVEL-0
8/2/2019 Email Hacking
20/28
IMPLEMENTATION
Home Module
Login Module
Registration Module
Account Module
8/2/2019 Email Hacking
21/28
Home Page:
Here User clicks on xmail to go to his account.
8/2/2019 Email Hacking
22/28
User login:
This is login form for user.
8/2/2019 Email Hacking
23/28
User Registration:
Registers here for new user account.
8/2/2019 Email Hacking
24/28
User Account:
User reads mails, save mails, sends mails, compose mails, change password in
there account
8/2/2019 Email Hacking
25/28
8/2/2019 Email Hacking
26/28
8/2/2019 Email Hacking
27/28
8/2/2019 Email Hacking
28/28