Search this site
Embedded Files
Skip to main content
Skip to navigation
Anup Sanjay Patil
Home
Cyber Security
EXPERIMENT NO:- 1
Section 65:Tampering With Computer documents.
Section 66: Computer related offences.
Section 69:
Section67:punishment for publishing or transmitting obscene material in ele
Section 68: Power of Controller to give directions.
Section 70: Protected system.
Section 71: Penalty for misrepresentation
Penalty for Breach of cnfidentiality and privacy.
Section 73: Penalty for publishing Digital Signature Certificate false in
Section 74: Publication for fraudulent purpose
Section 75: Act to apply for offence or contravention committed outside ind
Section 76: Confiscation.
Section 77: Compensation,penalties or consfication not to interface with
Section 78: Power to investigate offences
EXPERIMENT NO:-2
2021
2020
2019
three recent virus alerts
Guide on How to report Security incident
Guide on filing a complaint on National Cyber Crime Reporting Portal
EXPERIMENT NO:- 3
Live host identification :Hping3
Network and Port Scanner: NMAP
Nmap stealth Scan
DNS Analysis:dnsenum
SSL Analysis:(TLSSLed)
Dmitry
pOf
EXPERIMENT NO: 4
EXPERIMENT NO: 5
Web Application Proxies: Burpsuite
ZapProxy
EXPERIMENT NO: 6
EXPERIMENT NO: 7
EXPERIMENT NO: 8
Forensic Image Tool: ddrescue
PDF Forensics Tool:pdf-parser
EXPERIMENT NO: 9
Hire Me!
Anup Sanjay Patil
Home
Cyber Security
EXPERIMENT NO:- 1
Section 65:Tampering With Computer documents.
Section 66: Computer related offences.
Section 69:
Section67:punishment for publishing or transmitting obscene material in ele
Section 68: Power of Controller to give directions.
Section 70: Protected system.
Section 71: Penalty for misrepresentation
Penalty for Breach of cnfidentiality and privacy.
Section 73: Penalty for publishing Digital Signature Certificate false in
Section 74: Publication for fraudulent purpose
Section 75: Act to apply for offence or contravention committed outside ind
Section 76: Confiscation.
Section 77: Compensation,penalties or consfication not to interface with
Section 78: Power to investigate offences
EXPERIMENT NO:-2
2021
2020
2019
three recent virus alerts
Guide on How to report Security incident
Guide on filing a complaint on National Cyber Crime Reporting Portal
EXPERIMENT NO:- 3
Live host identification :Hping3
Network and Port Scanner: NMAP
Nmap stealth Scan
DNS Analysis:dnsenum
SSL Analysis:(TLSSLed)
Dmitry
pOf
EXPERIMENT NO: 4
EXPERIMENT NO: 5
Web Application Proxies: Burpsuite
ZapProxy
EXPERIMENT NO: 6
EXPERIMENT NO: 7
EXPERIMENT NO: 8
Forensic Image Tool: ddrescue
PDF Forensics Tool:pdf-parser
EXPERIMENT NO: 9
Hire Me!
More
Home
Cyber Security
EXPERIMENT NO:- 1
Section 65:Tampering With Computer documents.
Section 66: Computer related offences.
Section 69:
Section67:punishment for publishing or transmitting obscene material in ele
Section 68: Power of Controller to give directions.
Section 70: Protected system.
Section 71: Penalty for misrepresentation
Penalty for Breach of cnfidentiality and privacy.
Section 73: Penalty for publishing Digital Signature Certificate false in
Section 74: Publication for fraudulent purpose
Section 75: Act to apply for offence or contravention committed outside ind
Section 76: Confiscation.
Section 77: Compensation,penalties or consfication not to interface with
Section 78: Power to investigate offences
EXPERIMENT NO:-2
2021
2020
2019
three recent virus alerts
Guide on How to report Security incident
Guide on filing a complaint on National Cyber Crime Reporting Portal
EXPERIMENT NO:- 3
Live host identification :Hping3
Network and Port Scanner: NMAP
Nmap stealth Scan
DNS Analysis:dnsenum
SSL Analysis:(TLSSLed)
Dmitry
pOf
EXPERIMENT NO: 4
EXPERIMENT NO: 5
Web Application Proxies: Burpsuite
ZapProxy
EXPERIMENT NO: 6
EXPERIMENT NO: 7
EXPERIMENT NO: 8
Forensic Image Tool: ddrescue
PDF Forensics Tool:pdf-parser
EXPERIMENT NO: 9
Hire Me!
Cyber Security Lab
Name:-
ANUP SANJAY PATIL
CLASS:-
BE(A)
ROLL NUMBER:-
72
COURSE:-
COMPUTER ENGINEERING
Aim
:-Study Of Information Technology Act Indian Perspective.
Aim
:-Study of Recent Cyber Incidents/Vulnerability
.
Aim:- Study of Information Gathering Tools in Kali Linux.
Aim:- Study Of Vulnerability Analysis Tools in kali Linux.
Aim:-Study of Web Application Analysis Tools in Kali Linux.
Aim:- Study of Database Assessment Tools in Kali Linux.
Aim:Study of Sniffing and Spoofing Tools in kali Linux.
Aim:Study of Forensics Tools in Kali Linux.
Aim:Study of Reporting Tools in Kali Linux.
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse