0% found this document useful (0 votes)
238 views

Ethical Hacking Fundamentals Labs

The document outlines an Ethical Hacking Labs course at Shri Shankaracharya Professional University including course objectives, outcomes, and a list of 15 practical lab questions covering topics like scanning networks, analyzing browser and SQL injection attacks, decrypting files, and extracting information.

Uploaded by

shweta dubey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
238 views

Ethical Hacking Fundamentals Labs

The document outlines an Ethical Hacking Labs course at Shri Shankaracharya Professional University including course objectives, outcomes, and a list of 15 practical lab questions covering topics like scanning networks, analyzing browser and SQL injection attacks, decrypting files, and extracting information.

Uploaded by

shweta dubey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Shri Shankaracharya Professional University

Bhilai (C.G.)
B Tech

Branch : Computer Science & Semester : IV


Engineering
Subject : Ethical Hacking Labs Subject Code : BTECHCSE-464
Internal Class Tests : Three ESE Duration : Three Hours
ESE Max. Marks : 70 Minimum Marks : 28
Internal Test+TA : 30 Minimum Marks : 12
(Max.Marks)

Course Objective:
1. Student must be able to develop basic level of experiments.
2. They must use some predefined tools.
3. Some professional commends must also be used as practice.

Course Outcome:
After Completion of this Course Students will be:
1. Ability to get higher knowledge related to hacking activities.
2. Ability to develop a secure system.
3. Ability to find out the system which is infected.
4. Ability to catch the threat before attacking on system.
Practical list contained practical questions. It must be maintain in Practical copiy
1. Scanning Options
Students will leverage Nmap, a network discovery and mapping tool, to identify the
systems on a network of responsibility. Students will utilize non-traditional scans to
attempt avoiding an Intrusion Detection System (IDS).
2. Analyze Browser-Based Heap Spray
Attack Students will identify a browser-based attack used against a corporate asset
using a network protocol analyzer. Students will determine the type of attack used and
pin point exploit code in network traffic.
3. Analyze SQL Injection Attack
Students will identify the use of an SQL Injection through the use of Wire shark. The
students will also isolate the different aspects of the SQL Injection and execute the
selected code.
4. Find the IP address of the machine which is running the RDP?
5. Find the OS name of the machine which is running MySQL database?
6. Find the HTTP method that poses a high risk to the application example.com?
Shri Shankaracharya Professional University
Bhilai (C.G.)
7. Find the Phone number the employee?
8. Find the file name which is tempered by comparing the hashes which is given in the
/hashes folder?
9. Decrypt the volume file using vera crypt?
10. Connect to the Server remotely using the credentials give by RDP?
11. Decode the file which is encoded in DES (ECB) format?
12. Find the password of the word press user “Raj”?
13. Find the attacker IP address who has launched the DOS attack?
14. Find the number of machines that were used to initiate the DDOS attack?
15. Find the username/password from the pcap file, which is in plain text?
16. Extract the information from the SDcard of the Android User?

You might also like