A
Micro project
On
“Prepare report on Trojan attack”
Submitted By
Sandhyarani Gaikwad(74)
Pragati Salunke (73)
Omkar Gore()
Guided By
Mrs.
Diploma Course in Computer Technology
(As per directives of I Scheme, MSBTE)
Sinhgad Institutes
Sinhgad Technical Education Society’s
SOU.VENUTAI CHAVAN POLYTECHNIC
PUNE - 411041
ACADEMIC YEAR 2021-2022
Maharashtra State Board of
Technical Education
Certificate
This is to certify that Ms. Sandhyarani Gaikwad with Roll No. 74 of Semester
VI of Diploma in Computer Technology of Institute Sou. Venutai Chavan
Polytechnic (Code: 0040) has successfully completed the Micro-Project in
ETI(22618) for the academic year 2021-2022 as prescribed in the curriculum.
Program Code: CM
Course Code: CM/4/I
Place: Pune Enrollment No: 1900400176
Date: Exam Seat No:
Subject Teacher Head of Department
Maharashtra State Board of
Technical Education
Certificate
This is to certify that Ms.Pragati Salunke with Roll No. 73 of Semester VI of
Diploma in Computer Technology of Institute Sou. Venutai Chavan
Polytechnic (Code: 0040) has successfully completed the Micro-Project in
ETI(22618) for the academic year 2021-2022 as prescribed in the curriculum.
Program Code: CM
Course Code: CM/4/I
Place: Pune Enrollment No: 1900400
Date: Exam Seat No:
Subject Teacher Head of Department
Maharashtra State Board of
Technical Education
Certificate
This is to certify that Mr. Omkar Gore with Roll No. 42 of Semester VI of
Diploma in Computer Technology of Institute Sou. Venutai Chavan
Polytechnic (Code: 0040) has successfully completed the Micro-Project in
ETI (22618) for the academic year 2021-2022 as prescribed in the curriculum.
Program Code: CM
Course Code: CM/4/I
Place: Pune Enrollment No: 1900400221
Date: Exam Seat No:
Subject Teacher Head of Department
INDEX
SR NO CONTENTS PAGE NO
1 1
Aim of the Micro-Project
2 Rationale 3
3 Course Outcomes Achieved 3
4 Literature Review 3
5 Actual Methodology Followed 4
6 Actual Resources Used 5
7 Skills Developed 15
8 Applications of Micro Project 15
ETI - 22618
Annexure - I
Micro-Project Proposal
1.0 Aim of the Micro-Project:
Aim of the project is to Study any Trojan attack ,Identify the Trojan attack.
2.0 Intended Course Outcomes:
a) Detect Network,Operating System and applications Vulnerabilities.
b) Describe Ethical Hacking Process.
c) Compare Models of Digital Forensic Investigation.
3.0 Proposed methodology:
I. We will focus on the materials we need, as well as the instructions and sort it out
in a manner which will expedite different responsibilities of the team
members.
II. We will study the concept of Trozan attack and types of it.
III. Cross check all the conclusions and answer. IV. Prepare a report on the topic.
IV.
V.
VI.
VII.
VIII.
IX. Prepare the final report.
Department of Computer Technology Academic Year 2020-21
ETI (22618)
4.0 Action Plan:
Sr. Name of
Planned Planned
No Details of Activity responsible
Start Date Finish Date
. Team members
Identify the requirements of the
1 23/04/2021 05/05/2021 Saurav Yadav
project.
2 Design the structure of the project. 05/05/2021 21/05/2021 Smit Joshi
Develop the program using
3 21/05/2021 25/05/2021 Soham Dhavale
Assembly 8086 language.
Debug code and eliminate errors
4 occurred during compilation and 25/05/2021 28/05/2021 Smit Joshi
execution.
5 Test the project. 28/05/2021 31/05/2021 Soham Dhavale
6 Prepare the final report. 02/06/2021 02/06/2021 Saurav Yadav
5.0 Resources Required:
S. No. Resources required Specifications
1 Computer system Intel(R) Pentium CPU, RAM 8 GB
2 Operating System Windows 11, 64 Bit Operating System
3 AntiVirus Quick Heal Total Security
6.0 Team members:
S. No. Roll. number Name of Student
1 74 Sandhyarani Gaikwad
2 73 Pragati Salunke
3 81 Omkar Gore
Department of Computer Technology Academic Year 2020-21 2
ETI (22618)
Annexure - II
Micro-Project Report
1.0 Rationale:
In our computer world, a Trojan Horse is a malicious security breaking program that
is
disguised as something benign. For example, you download what appears to be a
movie or music file, but when you click on it, you unleash a dangerous program
(Trojan horse program is downloaded on your PC) that erases your disk, sends your
credit card numbers and passwords to a stranger, or lets that stranger hijack your
computer to commit illegal attacks.
Nowadays there are so many Trojan Horses .These server-Trojans are installed on
somebody’s pc and person having that client-Trojan can access & control somebody’s
pc without his knowing. This may be dangerous. So computer users should know
about Trojan viruses and their potential harms to private data. Users should take care
while installing unknown software’s from internet. So this micro-project is totally
based on such Trojan Horse attacks and this research will be helpful to prevent such
cyber-attacks.
2.0 Aim of the Micro-Project:
3.0 Aim of the project is to Study any Trojan attack ,Identify the Trojan attack.
Department of Computer Technology Academic Year 2020-21 3
ETI (22618)
4.0 Course Outcomes Achieved:
a) .
5.0 Literature Review:
Operations to be performed on strings:
a) Reversing a given string.
b) Concatenating two strings.
a) Finding length of given string:
Given string to find
b) Reversing a given string:
Given string to reverse: “summer 2017”
c) Concatenating given strings:
Given string to concatenate:
String1: “Maharashtra board”
String2: “of technical Education”
6.0 Actual Methodology Followed:
The aim of the Micro-project is to develop program to find the length of a string,
reverse a string and to concatenate a string.
I.
II. Prepare the final report.
Department of Computer Technology Academic Year 2020-21 4
ETI (22618)
7.0 Actual Resources Used:
S. No. Resources required Specifications
1 Computer system Intel(R) Pentium CPU, RAM 4 GB
2 Operating System Windows 11, 64 Bit Operating System
3
7.0 Source code of program:
I. ALP
II. ALP to reverse a given string.
Given string to reverse: “summer 2017”
SET M
INT 21H
ENDM
.MODEL SMALL
;****** DATA SEGMENT ******
.DATA
EMPTY DB 10,13, " $"
Department of Computer Technology Academic Year 2020-21 5
ETI (22618)
STR1 DB 25,?,25 DUP('$')
STR2 DB 25,?,25 DUP('$')
MSTRING DB 10,13, "ENTER FIRST STRING: $"
MSTRING2 DB 10,13, "ENTER SECOND STRING: $"
MCONCAT DB 10,13, "CONCATENATED STRING: $"
;********** CODE SEGMENT ************
.CODE
START:
MOV AX,@DATA
MOV DS,AX
PRINT MSTRING
CALL ACCEPT_STRING
;STORING STRING IN STR2
PRINT MSTRING2
MOV AH,0AH
LEA DX,STR2
INT 21H
MOV CL,STR1+1 ;LENGTH OF STRING1 IN CL
MOV SI,OFFSET STR1
NEXT: INC SI
DEC CL
Department of Computer Technology Academic Year 2020-21 6
ETI (22618)
JNZ NEXT
INC SI
INC SI
MOV DI,OFFSET STR2
INC DI
INC DI
MOV CL,STR2
MOVE_NEXT:
MOV AL,[DI]
MOV [SI],AL
INC SI
INC DI
DEC CL
JNZ MOVE_NEXT
PRINT MCONCAT
PRINT STR1+2
EXIT:
MOV AH,4CH ;EXIT THE PROGRAM
INT 21H
;ACCEPT PROCEDURE
Department of Computer Technology Academic Year 2020-21 7
ETI (22618)
ACCEPT PROC NEAR
MOV AH,01
INT 21H
RET
ACCEPT ENDP
DISPLAY1 PROC NEAR
MOV AL,BL
MOV BL,AL
AND AL,0F0H
MOV CL,04
ROL AL,CL
CMP AL,09
JBE NUMBER
ADD AL,07
NUMBER: ADD AL,30H
MOV DL,AL
MOV AH,02
INT 21H
MOV AL,BL
AND AL,00FH
CMP AL,09
JBE NUMBER2
ADD AL,07
NUMBER2: ADD AL,30H
Department of Computer Technology Academic Year 2020-21 8
ETI (22618)
MOV DL,AL
MOV AH,02
INT 21H
RET
DISPLAY1 ENDP
ACCEPT_STRING PROC NEAR
MOV AH,0AH ;ACCEPT STRING FROM USER FUNCTION
MOV DX,OFFSET STR1 ; STORE THE STRING IN MEMORY POINTED BY "DX"
INT 21H
RET
ACCEPT_STRING ENDP
END START
END
8.0 Output:
Department of Computer Technology Academic Year 2020-21 9
ETI (22618)
Fig. 1.1 Output of ALP for finding string length
Fig. 1.2 Output of ALP for reversing a string
Department of Computer Technology Academic Year 2020-21 10
ETI (22618)
Fig. 1.3 Output of ALP for concatenating strings
9.0 Skills Developed:
During the course of this micro-project, we learnt to make Assembly language
program for different problems.
a) We learnt various syntaxes of Assembly language,
b) We learnt to create algorithm in Assembly language.
c) We also learnt to develop programs in Assembly language.
10.0 Applications of this Micro-project:
This micro-project finds its application in:
a) To find the length of a given string.
b) For reversing a string.
c) For concatenating two strings.
Department of Computer Technology Academic Year 2020-21 11
ETI (22618)
11.0 Area of future Improvement:
In future, the program can be modified for using more larger strings, to find length of
larger strings, reversing bigger strings. Also, it can be modified to concatenate more
than two strings.
12.0 Conclusion:
We learn to make programs for different problems in Assembly language.
Department of Computer Technology Academic Year 2020-21 12