Problem Statements
Problem Statements
○ Create a platform where users can share their expertise and knowledge
with others through interactive tutorials and discussions.
3. Email Spoofing Detection – Spoofed email with swapped email id(and IP too)
can come to any user’s inbox
○ Email spoofing is a cyber-attack where hackers manipulate email
headers to make messages appear from a trusted source. It is
commonly used in phishing and spam attacks to steal sensitive
information, spread malware, or deceive victims in scams like Business
Email Compromise (BEC). Attackers achieve this by setting up or
compromising an SMTP server and altering email fields such as ‘From’
and ‘Reply-To’ to impersonate legitimate entities.
OR