BBF_merged
BBF_merged
PROJECT REPORT
ON
DEVELOPED BY
Pratiksha Bombale 05
Preeti Bhoge 42
Shravani Adhav 44
IN PARTIAL FULFILLMENT OF
DIPLOMA IN COMPUTER TECHNOLOGY
2024-2025
CERTIFICATE
Pratiksha Bombale 05
Preeti Bhoge 42
Shravani Adhav 44
IN PARTIAL FULFILLMENT OF
ACADEMIC REQUIREMENT FOR THE YEAR
2024-25
AS PRESCRIBED BY
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION, MUMBAI
DATE: PLACE:
Pune
Certificate
This is to certify that Ms. Pratiksha Prakash Bombale from Sou. Venutai Chavan
Polytechnic having Enrollment No. 2200400277 has completed Project of Final Year having
Title “Cyber Tool for Digital Forensic Investigation” during Academic Year 2024-2025. The
project completed in a group consisting of four candidates under the guidance of the Faculty
Guide.
--------------------------------------------
Name and Signature of Guide
Ms. A. D. Mate
ANNEXURE A
Certificate
This is to certify that Ms. Preeti Dattatraya Bhoge from Sou. Venutai Chavan Polytechnic
having Enrollment No. 2200400368 has completed Project of Final Year having Title
“Cyber Tool for Digital Forensic Investigation” during Academic Year 2024-2025. The
project completed in a group consisting of four candidates under the guidance of the Faculty
Guide.
--------------------------------------------
Name and Signature of Guide
Ms. A. D. Mate
ANNEXURE A
Certificate
This is to certify that Ms. Shravani Hanumant Adhav from Sou. Venutai Chavan
Polytechnic having Enrollment No. 2200400373 has completed Project of Final Year having
Title “Cyber Tool for Digital Forensic Investigation” during Academic Year 2024-2025. The
project completed in a group consisting of four candidates under the guidance of the Faculty
Guide.
--------------------------------------------
Name and Signature of Guide
Ms. A. D. Mate
ACKNOWLEDGEMENT
"I'm really grateful to the many people who helped me create the ‘Cyber Tool for Digital
Forensic Investigation’ project. Just like any project, it took some smarts, hard work, and
planning to get it done. But along the way, we learned even more than we expected. Not only did
it improve our thinking skills, but it also showed us how important it is to work together as a team.
A project this good wouldn't have been possible without everyone who pitched in, including the
people who shared their knowledge and helped guide us."
First and foremost, I would wish to record my gratitude and thanks to Ms. A. D. Mate, our mentor,
for her essential assistance, encouragement, and direction in successful completion of project. I
express my thanks to Dr. (Mrs.) M. S. Jadhav (Principal), Prof. A. V. Kurkute (Head of
Department, Computer Technology) and Mrs. S. S. Kadam (Project Coordinator) for their
valuable guidance. I am also thankful to other teachers and non-teaching staff of Computer
Technology Department and Library for their cooperation and help.
Lastly, I need to extend my thanks to all those, who helped us directly or indirectly in completing
this team project.
PRATIKSHA BOMBALE
PREETI BHOGE
SHRAVANI ADHAV
ABSTRACT
INDEX OF FIGURE
In today’s hyper-connected digital era, the risk of cyber threats such as spam files, phishing
websites, and insecure WiFi networks has significantly increased. With smartphones becoming
central to both personal and professional activities, the need for mobile cybersecurity solutions is
more crucial than ever. Cyber Shield is a smart Android application designed to tackle these
challenges by offering users real-time detection of potential cyber threats. The app empowers
individuals to proactively assess the safety of files, websites, and wireless networks directly from
their mobile devices. By integrating multiple layers of security checks into a user-friendly
interface, Cyber Shield provides a comprehensive approach to everyday digital protection.
This project leverages modern Android development practices and backend integration to deliver
efficient and reliable threat analysis. Whether it’s identifying spam files, checking the security
posture of a website, or analyzing WiFi safety, Cyber Shield acts as a digital shield—enhancing
user awareness and promoting secure online behavior. Cyber tools for digital forensic
investigation have developed in response to the growing complexity of cybercrime, starting with
the rise of computers in the 1970s and 1980s. Initially, crimes like financial fraud and hacking
were difficult to investigate due to the lack of standardized methods or tools to retrieve and analyze
digital data.
As the internet expanded in the 1990s, the need for specialized tools became urgent, leading to
the creation of early forensic software like EnCase and Forensic Toolkit (FTK). These tools
enabled investigators to recover deleted files, examine file systems, and present digital evidence
in court. The 2000s saw the increasing importance of mobile devices, cloud computing, and
encrypted data in investigations.
This prompted the development of more advanced cyber forensic tools capable of extracting data
from a wider range of sources, including smartphones, social media platforms, and cloud storage.
Alongside technological advances, the legal framework for handling and presenting digital
evidence became more structured, ensuring that evidence could meet judicial standards. Today,
with the integration of AI, machine learning, and big data analytics, cyber forensic tools are more
powerful and efficient. They can handle new challenges such as Internet of Things (IoT) forensics
and blockchain investigations, making them crucial in combating modern cybercrime.
1.2 Background
As digital dependence grows, so does the surface area for cyberattacks. Every day, users
unknowingly download malicious files, visit phishing websites, or connect to unprotected WiFi
networks, exposing themselves to data breaches, identity theft, and financial loss. Traditional
cybersecurity tools, while powerful, are often complex and designed for desktop environments,
leaving mobile users vulnerable. With the widespread use of Android smartphones, there is a
pressing need for security solutions that are both accessible and effective on mobile platforms.
Many users lack the technical knowledge to evaluate digital threats manually, creating a demand
for automated, intelligent tools that can analyze risks in real-time without overwhelming the user.
CyberShield was conceptualized to fill this gap. It aims to simplify mobile cybersecurity by
providing quick and accurate assessments of files, websites, and wireless networks. By offering
these features in a single Android application, the project addresses the increasing need for on-the-
go digital protection in a convenient and intuitive format. As cyber threats continue to evolve in
complexity and frequency, the demand for advanced digital forensic tools has never been more
critical. Modern investigative efforts must encompass multiple vectors of attack, including web-
based vulnerabilities, wireless network exploits, and malicious file distribution. Traditional tools
often fall short in addressing these diverse areas in a unified manner. To bridge this gap, the
proposed cyber tool integrates three core capabilities essential to comprehensive digital forensic
investigation:
Website Security Analysis: Scans websites for vulnerabilities such as SQL injection, cross-site
scripting (XSS), and outdated software components, aiding in the identification of attack surfaces
exploited by threat actors.
WiFi Network Analysis: Monitors wireless network traffic to detect unauthorized access, packet
sniffing, and potential man-in-the-middle attacks, ensuring the integrity of digital evidence and
network security.
File Detection and Analysis: Detects and analyzes suspicious or malicious files, including
executables and document-based threats, using signature-based and heuristic techniques to
uncover hidden malware or data exfiltration attempts.
[4] Arjun Anand V,Buvanasri A K,Meenakshi R,Karthika S, Ashok Kumar Mohan,2020 4th
International Conference on Computer, Communication and Signal Processing (ICCCSP)
Year: 2020 “PeopleXploit: A hybrid tool to collect public data ”Year: 2020
This paper introduces the concept of Open Source Intelligence (OSINT) as an important
application in intelligent profiling of individuals. With a variety of tools available, significant data
shall be obtained on an individual as a consequence of analyzing his/her internet presence but all
of this comes at the cost of low relevance. To increase the relevance score in profiling,
PeopleXploit is being introduced. PeopleXploit is a hybrid tool which helps in collecting the
publicly available information that is reliable and relevant to the given input.
The development of CyberShield follows a modular and systematic approach, combining mobile
application development with backend server integration to deliver real-time threat detection
capabilities. The methodology can be broadly categorized into three key phases: requirement
analysis, design and development, and testing and deployment.
1. Requirement Analysis
This initial phase involved identifying the core functionalities needed to address the cybersecurity
challenges faced by mobile users. Based on user behavior and common threat vectors, the
application was designed to focus on three primary domains:
Relevant technologies and tools were also selected at this stage, including Android Studio (Java)
for the frontend and Flask (Python) for backend services.
• Frontend (Mobile Application): Developed using Java in Android Studio, this component
handles user interactions and displays the analysis results in a user-friendly format. Key
functionalities include file upload, URL input, and WiFi network scanning.
• Backend (Server Processing): Implemented using Flask, the backend receives data from the
mobile application, performs necessary analyses, and returns threat evaluation results. It
supports:
• Text file spam detection using predefined heuristics or models
• Website analysis through HTTP header checks, SSL certificate validation, and simulated
blacklist detection
• WiFi assessment using network parameters like encryption type and IP configuration
• Communication between the mobile app and backend is handled via RESTful APIs using
OkHttp for reliable and secure data transfer.
• For file analysis, the selected file is read and sent to the backend server.
• For website analysis, HTTP requests are made to fetch headers, SSL certificate details, and
simulate blacklist and subdomain checks.
• For WiFi analysis, the app collects network parameters such as SSID, signal strength,
encryption type, IP address, DNS server, and gateway.
• A Flask server receives file or website data through RESTful API calls.
• File content is analyzed using predefined rules or machine learning heuristics to determine if
the file is spam or safe.
• Website data is processed to evaluate:
• SSL/TLS certification
• Security headers (e.g., HSTS)
• Presence on blacklists (simulated)
• Open ports and subdomain vulnerabilities
• WiFi security is assessed locally on the device based on encryption protocols and
network type (e.g., Open, WPA2).
After analysis, the backend returns a JSON response with the threat status.
The mobile application processes and displays the result in a clear and informative manner,
indicating whether the input is safe, potentially risky, or unsafe.
Based on the results, users are alerted with appropriate warnings or confirmations.
The app may suggest actions such as disconnecting from insecure WiFi or avoiding access to
suspicious websites.
Software
• Android Development: Java (Android Studio).
• Networking & Security: HTTPURLConnection, HTTPS detection, API integration.
• Backend for File Spam Detection: Flask (Python) server, OkHttp (for API communication).
Hardware
• Hardware: 2gb RAM
• 2ghz Dual core processor
• 512 GB HDD Storage
3.4 Advantages
This image illustrates the architecture of a cybersecurity-based Android application. The system is
divided into three main components: the client side, server side, and local device analysis. On the
client side, the Android app includes modules for file scanning, website analysis, and WiFi security
checks. These modules interact with a Flask-based backend on the server side, where the API layer
receives data, the processing layer analyzes it, and a JSON response is sent back to the client.
Additionally, the WiFi security module also performs local analysis directly on the device to ensure
better network protection.
User
Website Checker
5.2 Applications
1. File Spam Detection: Helps users identify and block spam or malicious files that could
contain viruses, ransomware, or spyware. Useful when downloading files from unknown
sources.
2. Website Security Assessment: Scans and evaluates websites for threats like phishing,
malware, or fake pages—ensuring safer online browsing, especially during online transactions
or logins.
3. Wi-Fi Security Analysis: Checks the security of connected Wi-Fi networks to detect
vulnerabilities like open ports or weak encryption, protecting users from data theft on public
or unsecured networks.
4. Real-Time Threat Alerts: Notifies users instantly when a potential threat is detected, allowing
quick action to prevent harm or data loss
Test Case
Test Description Input Expected Output
ID
“Invalid File” or
TC_03 Upload empty file Blank .txt file
appropriate warning
TC_04 Upload unsupported file type PDF/Word file “Unsupported File Type”
File with mixed content (safe Mixed-content text “Potentially Spam File” or
TC_05
+ spam phrases) file partial alert
Test
Test Description Input Expected Output
Case ID
TC_03 “Phishing or
Analyze phishing/malicious
http://phishingsite.com Dangerous Site
site (blacklist sim)
Detected”
TC_04 Analyze site with missing Site with no HSTS, X- “Website Missing
security headers Frame-Opts Security Headers”
Analyze WPA2-secured
TC_01 Encrypted WiFi “Secure Network”
WiFi
By proactively scanning for malware, phishing attempts, and unsafe networks, CyberShield
ensures that users can browse, download, and connect with confidence. Its user-friendly interface
and intelligent threat detection system make it an essential companion for anyone seeking a safer
and more secure digital experience across devices.
• Future scope
The future scope of CyberShield lies in its potential to evolve alongside the rapidly changing
landscape of cybersecurity threats. As cyberattacks become more sophisticated, future versions of
the tool can incorporate artificial intelligence and machine learning to detect and respond to threats
in real time with greater accuracy. The integration of behavioral analysis will allow the app to
identify suspicious activity even before it is recognized as a known threat. Additionally, expanding
support for Internet of Things (IoT) devices will ensure users are protected across all connected
platforms. Future developments may also include parental controls, data privacy management
tools, and personalized security insights, making CyberShield a complete digital safety solution
for individuals and organizations.
• Limitations
[2] Mary Geddes De Montfort University Leicester, UK Dr Pooneh Bagheri Zadeh De Montfort
University Leicester, UK “Forensic Analysis of Private Browsing”
[3] Ifeoma U. Ohaeri1 Computer Science Department North-West University Mafikeng North-
West Province, South Africa Bukohwo M. Esiefarienhe2 Computer Science Department North-
West University Mafikeng North-West Province, South Africa Digital “Forensic Process Model
for Information System and Network Security Management”
[4] Arjun Anand V,Buvanasri A K,Meenakshi R,Karthika S, Ashok Kumar Mohan,2020 4th
International Conference on Computer, Communication and Signal Processing (ICCCSP) Year:
2020 “PeopleXploit: A hybrid tool to collect public data ”Year: 2020
7.2 Books
• https://www.sleuthkit.org/
• https://toolcatalog.nist.gov/
• https://www.magnetforensics.com/
• https://www.sans.org/tools/sift-workstation/
• https://www.exterro.com/digital-forensics-software/forensic-toolkit