+ All Categories
Home > Documents > Email Hacking

Email Hacking

Date post: 05-Apr-2018
Category:
Upload: haritha-donthula
View: 220 times
Download: 0 times
Share this document with a friend

of 28

Transcript
  • 8/2/2019 Email Hacking

    1/28

    EMAIL HACKING

    BY

    BATCH-03

    D.HARITHA 08871A1228D.KEERTHI 08871A1231

    K.HEMALATHA 08871A1244

    B.SREELATHA 08871A1212

    PROJECT GUIDE: N.RAJENDER

    PROJECT CO-ORDINATOR: D.RAJASHEKAR

  • 8/2/2019 Email Hacking

    2/28

    ABSTRACTEmail Hacking is nothing but to hack the userid and password of

    the email user.

    Email Hacking is used to hack the userid and password of the

    email user by developing a fake webpage which looks same as theoriginal webpage. The user enters the details in the fake web form then

    the details will be stored in the database .Then by using the details of the

    user stored in database the email hacker will enter the user mail inbox by

    entering the userid and password, then he can do any malicious

    functions.

    There are several methods for hacking yahoo, msn or AOL email

    accounts. One of these methods is social engineering.

    Social engineering consists in the ability to trick someone inbelieving that he is giving information to someone who has the authority

    to ask for it.

  • 8/2/2019 Email Hacking

    3/28

    REQUIREMENT SPECIFICATIONS

    Hardware Requirement Specifications(HRS)

    Processor Pentium III/IV/Dual Core/Core 2 Duo

    RAM 100GB

    Hard Disk 128MB or above

  • 8/2/2019 Email Hacking

    4/28

    Software Requirement Specifications(SRS)

    Operating System Windows XP, Windows 7

    Technology .NET Framework

    Language ASP.NET

    Data Base SqlServer 2005

    Browser Any web browser IE, Firefox etc.

    Server Internet Information Services(IIS)

  • 8/2/2019 Email Hacking

    5/28

    LITERATURE SURVEY

    Existing system:

    There are different techniques for E-Mail Hacking. Those are

    1. Phishing

    2. Keystroke Capturing

    a. Hardware Keylogger

    b.Software Keylogger3. Password Guessing.

  • 8/2/2019 Email Hacking

    6/28

    Proposed System:

    In this proposed system we are going to simulate the Phishing

    in very effective way that the user can fall into the hacking net very

    easily. Because we will hack the email by fake form. We use different

    fake forms it means we will not use same forms for hacking the email.

  • 8/2/2019 Email Hacking

    7/28

    SOFTWARE REQUIREMENT SPECIFICATION

    1. INTRODUCTION

    1.1 Purpose

    1.2 Scope

    1.3 Definations , Acronyms and Abbrevations

    1.4 References

  • 8/2/2019 Email Hacking

    8/28

    2. The Overall Description

    2.1 Product Perspective

    2.1.1 Hardware Interfaces

    2.1.2 Software Interfaces

    2.1.3 Communications Interfaces

    2.2 Product Functions

    2.3 User Characteristics

    2.4 Constraints

  • 8/2/2019 Email Hacking

    9/28

    3. Specific Requirements

    3.1 External interface

    3.2 Performance Requirements

    Availability

    3.3 Logical Database Requirements

    3.4 Design Constraints

    3.4.1 Standards Compliance

  • 8/2/2019 Email Hacking

    10/28

    3.5 Software System Attributes

    3.5.1Maintainability

    3.5.2 Portability

  • 8/2/2019 Email Hacking

    11/28

    Login

    +UserId

    +Password

    +Login()

    +Clear()

    New User

    +FirstName+LastName

    +DOB+Gender

    +UserId

    +Password

    +ConfirmPassword+Country

    +Nationality+EmailId

    +Submit()+Cancel()

    +Back()

    Accountarea

    Inbox

    +frommail+datetime

    +subject

    +staus

    +readmail()

    Compose

    +tomail+subject

    +attachfile

    +mail

    +senmail()

    +savemail()

    +discard()

    Sent Items

    +tomail+datetime

    +subject

    +status

    +readsentmail()

    +resentmail()

    Drafts

    +tomail+datetime

    +subject

    +status

    +readsavedmail()

    +sendmail()

    setting

    +Current Password+new password

    +re enter password

    +submit()

    Fig: Class Diagram For user

    DESIGNING PHASE

  • 8/2/2019 Email Hacking

    12/28

    Visit Home page

    Logout

    Sends & Save Mails

    Compose Mail

    Login page

    Account Area page

    Reads Mails from inbox

    Exist ing User

    Fig: Usecase Diagram for Existing User

  • 8/2/2019 Email Hacking

    13/28

    Visit Home page

    Logout

    Sends & Save Mails

    Compose Mail

    Login page

    Account Area page

    Reads Mails from inbox

    New User Registration

    New User

    Fig: Usecase Diagram for New User

  • 8/2/2019 Email Hacking

    14/28

    Logouts from the current page

    Existing User Visit HomePage

    Login Page AccountareaPage

    Reads mailsfrom Inbox

    Compose mail Send & Savemail

    Logout

    Visits home page

    Enters login page

    Enters into Accountarea page

    Reads mails from Inbox

    Compose mail

    Sends and save mails

    Fig: Sequence Diagram For Existing User

  • 8/2/2019 Email Hacking

    15/28

    Login PageExisting User Visit Home

    Page

    Accountarea

    Page

    Reads mails

    from Inbox

    Compose mail Send & Save

    mail

    LogoutNew user

    Registration

    Visits home page

    Enters login page

    Enters into Accountarea page

    Reads mails from Inbox

    Compose mail

    Sends and save mails

    Logouts from the current page

    Register for New Userid

    Fig: Sequence Diagram for New User

  • 8/2/2019 Email Hacking

    16/28

    Existing

    User

    Visit Home

    Page

    Login

    Page

    Accountarea

    Page

    Reads mails from

    Inbox

    Send & Save

    mail

    Compose

    mail

    Logout

    1: 2:

    3:4:

    5:

    6:

    7:

    Fig: Collaboration Diagram for Existing User

  • 8/2/2019 Email Hacking

    17/28

    Existing

    User

    Visit Home

    Page

    Login

    Page

    Accountarea

    Page

    Reads mails from

    Inbox

    Send & Save

    mail

    Composemail

    Logout

    1: 2:

    4:5:

    6:

    7:

    8:

    New user

    Registration

    3:

    Fig: Collaboration Diagram For New User

  • 8/2/2019 Email Hacking

    18/28

    Home page

    login page

    sign upEnter userid and

    password

    Accountpage

    inbox compose sent drafts settings logout

    Fig: Activity Diagram for user

  • 8/2/2019 Email Hacking

    19/28

    Fig: DataFlow Diagram

    LEVEL-0

  • 8/2/2019 Email Hacking

    20/28

    IMPLEMENTATION

    Home Module

    Login Module

    Registration Module

    Account Module

  • 8/2/2019 Email Hacking

    21/28

    Home Page:

    Here User clicks on xmail to go to his account.

  • 8/2/2019 Email Hacking

    22/28

    User login:

    This is login form for user.

  • 8/2/2019 Email Hacking

    23/28

    User Registration:

    Registers here for new user account.

  • 8/2/2019 Email Hacking

    24/28

    User Account:

    User reads mails, save mails, sends mails, compose mails, change password in

    there account

  • 8/2/2019 Email Hacking

    25/28

  • 8/2/2019 Email Hacking

    26/28

  • 8/2/2019 Email Hacking

    27/28

  • 8/2/2019 Email Hacking

    28/28


Recommended