Ethical Hacking Fundamentals Labs
Ethical Hacking Fundamentals Labs
Bhilai (C.G.)
B Tech
Course Objective:
1. Student must be able to develop basic level of experiments.
2. They must use some predefined tools.
3. Some professional commends must also be used as practice.
Course Outcome:
After Completion of this Course Students will be:
1. Ability to get higher knowledge related to hacking activities.
2. Ability to develop a secure system.
3. Ability to find out the system which is infected.
4. Ability to catch the threat before attacking on system.
Practical list contained practical questions. It must be maintain in Practical copiy
1. Scanning Options
Students will leverage Nmap, a network discovery and mapping tool, to identify the
systems on a network of responsibility. Students will utilize non-traditional scans to
attempt avoiding an Intrusion Detection System (IDS).
2. Analyze Browser-Based Heap Spray
Attack Students will identify a browser-based attack used against a corporate asset
using a network protocol analyzer. Students will determine the type of attack used and
pin point exploit code in network traffic.
3. Analyze SQL Injection Attack
Students will identify the use of an SQL Injection through the use of Wire shark. The
students will also isolate the different aspects of the SQL Injection and execute the
selected code.
4. Find the IP address of the machine which is running the RDP?
5. Find the OS name of the machine which is running MySQL database?
6. Find the HTTP method that poses a high risk to the application example.com?
Shri Shankaracharya Professional University
Bhilai (C.G.)
7. Find the Phone number the employee?
8. Find the file name which is tempered by comparing the hashes which is given in the
/hashes folder?
9. Decrypt the volume file using vera crypt?
10. Connect to the Server remotely using the credentials give by RDP?
11. Decode the file which is encoded in DES (ECB) format?
12. Find the password of the word press user “Raj”?
13. Find the attacker IP address who has launched the DOS attack?
14. Find the number of machines that were used to initiate the DDOS attack?
15. Find the username/password from the pcap file, which is in plain text?
16. Extract the information from the SDcard of the Android User?