Projects and Reports

Rogue DHCP Server Detection

Project Scope

The project understands the security issues of a rogue dhcp server and develops a technique by which rogue dhcp servers can be detected on a network using port scanning. The project demonstrates how scanning techniques can be used to detect rogue dhcp servers on the network.

Buy and Download the report for the solution

Report Contents

1. Project Scope
2. Understanding DHCP Servers
3. Understanding Rogue DHCP Servers
4. Rogue DHCP Server Detection Technique
5. Port Scanning
6. Lab Design
7. Lab Diagram
8. NMAP Scanning Script
9. Testing and Verification
10. Conclusion

Report Format – PDF

No of Pages -5

Price – $20

Buy and Download with PayPal or credit card on PayPal website using the Add to cart button


The report would be downloaded automatically and you would also receive the download link in the email used for payment

Custom Project Report – Click here

Research Topics

This section of the website contains cyber security research topics for papers, projects and presentation . Latest topics related to security threats, attacks and mitigation techniques are provided below. We also have Cyber security paper writing services where we develop custom papers based on specific titles.

1. Database Security threats

Understand the different types of threats targeting a database like SQL injection attack , how they work and different techniques which should be used to mitigate these attacks

2. DDOS attacks and financial loss

Understand the impact of DDOS attacks on mission critical servers and how it can impact an organization financially

3. Malware mitigation plan

Understand the different types of malware on the internet and measure your networks vulnerability of the same. Design a mitigation plan for the identified malware vulnerability.

4. Study of Phishing, types and mitigation techniques

Understand how phishing attacks work , the different types of phishing techniques and counter measures

Security Paper Writing Services – Email Us

5. Comparative study of trojan and antivirus

Perform a study of trojans and antivirus, how they differ in their working ,impact on commercial networks and mitigation technique.

6. Comparative study of intrusion detection and intrusion prevention systems

Understand the working for intrusion detection and intrusion prevention systems , identify the differences and why you would recommend IPS over IDS.

Cyber Security reports – Click Here

7. Cyber Security assessment

Identify the method you would use to conduct a cyber security assessment for an organization based on different available standards like NIST Guidelines, SANS, CISecurity etc.

8. Web application Penetration Testing

Design a penetration test plan for web application using standards like OWASP and identify the different tools (Commercial and free) which you would use to conduct the tests.

9. Fingerprinting Tool

Develop a custom fingerprinting tool using Python which would identify the operating systems of the remote host.

Security Paper Writing Services – Email Us

10. Practical analysis of Key loggers

Understand how key loggers work, how they get installed on your computer and the security issues encountered in a scenario.

11. Ransomware attacks

Understand the technique behind ransomware attacks , how they work on a network and different mitigation techniques.

Cyber Security reports – Click Here

12. Password cracking

Identify different password cracking techniques like brute force, how they work and the different tools used for the same.

13. Data Backup Security

Design your network infrastructure to protect your backups. The backup data should be stored on secure servers accessible only by authorized personal.

14. IoT Security

Design a solution to identify security issues in IOT products and report it to the customer instantaneously.

Security Paper Writing Services – Email Us

Cyber Security reports – Click Here

Network programming assignment topics

This section of the website contains topics for network programming assignment. Scripts are developed using Python with additional frameworks.

TCP Syn Sender

A TCP packet sender developed with Python which sends custom TCP SYN Packets.

Mac Spoofer

A script developed with Python which sends packets with custom mac-address.

UDP Packet Injector

A UDP packet sender developed with Python which sends custom UDP Packets.

IP Scanner Tool

Script developed with Python which scans the list of IP address on the network.

Lan Speed Testing Tool

Script developed with Python which tests the speed of a LAN network.

Mac Finder Tool

Script developed with Python which finds the mac-address of a device based on IP address.

The source code for the above tools and scripts is included as part of the course Network Testing Course

Network Security assignment Topics

This section of the website contains network security assignment topics. The assignment title along with description is provided which can be used for research activity.

Secure network design with DMZ (Demilitarized Zone)

Understands the concept of Demilitarized zone in a network environment and the mechanism and network design strategy by which a server which is exposed to the internet can be setup in DMZ zone for access by users on the internet and the LAN.

Comparative study of Network and application layer firewalls

A comparative study on network and application layers firewalls, deployment strategies, the limitations and improvements, and the typical attacks which are blocked using the firewalls.

Database attacks and defense

Understands the different types of attacks which are targeted on a database infrastructure, like network sniffing, weak passwords, sql injection, brute force attacks etc. The anatomy of the attacks and the defense mechanism for each of the attacks is identified.

MITM vulnerable protocols and mitigation

Understands the anatomy of a Man in the middle attack and the anatomy. The different protocols which are vulnerable to the attack like, TCP, ARP etc and real time environments where the attacks are used are analyzed.

Comparative study of Firewalls, IDS and IPS

A comparative study on firewalls, IDS and IPS. The deployment scenarios, attacks which are defended by the devices, limitations and improvements are understood. The different vendors and modes of the devices are researched and documented.

Wireless migration from WEP to WPA

Understands the limitation and security issues with the WEP protocol and the improvements with WPA protocol. The different components which are required to setup WPA based wireless infrastructure like supplicants, WPA supported access points are understood