PTCCS344 Ethical Hacking Syllabus:
PTCCS344 Ethical Hacking Syllabus – Anna University Part time Regulation 2023
COURSE OBJECTIVES:
To understand the basics of computer based vulnerabilities.
To explore different foot printing, reconnaissance and scanning methods.
To expose the enumeration and vulnerability analysis methods.
To understand hacking options available in Web and wireless applications.
To explore the options for network protection.
To practice tools to perform ethical hacking to expose the vulnerabilities.
UNIT I INTRODUCTION
Ethical Hacking Overview – Role of Security and Penetration Testers .- Penetration-Testing Methodologies- Laws of the Land – Overview of TCP/IP- The Application Layer – The Transport Layer – The Internet Layer – IP Addressing .- Network and Computer Attacks – Malware – Protecting Against Malware Attacks.- Intruder Attacks – Addressing Physical Security
UNIT II FOOT PRINTING, RECONNAISSANCE AND SCANNING NETWORKS
Footprinting Concepts – Footprinting through Search Engines, Web Services, Social Networking Sites, Website, Email – Competitive Intelligence – Footprinting through Social Engineering – Footprinting Tools – Network Scanning Concepts – Port-Scanning Tools – Scanning Techniques – Scanning Beyond IDS and Firewall
UNIT III ENUMERATION AND VULNERABILITY ANALYSIS
Enumeration Concepts – NetBIOS Enumeration – SNMP, LDAP, NTP, SMTP and DNS Enumeration – Vulnerability Assessment Concepts – Desktop and Server OS Vulnerabilities – Windows OS Vulnerabilities – Tools for Identifying Vulnerabilities in Windows- Linux OS Vulnerabilities- Vulnerabilities of Embedded Oss
UNIT IV SYSTEM HACKING
Hacking Web Servers – Web Application Components- Vulnerabilities – Tools for Web Attackers and Security Testers Hacking Wireless Networks – Components of a Wireless Network – WardrivingWireless Hacking – Tools of the Trade
UNIT V NETWORK PROTECTION SYSTEMS
Access Control Lists. – Cisco Adaptive Security Appliance Firewall – Configuration and Risk Analysis Tools for Firewalls and Routers – Intrusion Detection and Prevention Systems – Network-Based and Host-Based IDSs and IPSs – Web Filtering – Security Incident Response Teams – Honeypots.
30 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1. Install Kali or Backtrack Linux / Metasploitable/ Windows XP
2. Practice the basics of reconnaissance.
3. Using FOCA / SearchDiggity tools, extract metadata and expanding the target list.
4. Aggregates information from public databases using online free tools like Paterva’s Maltego.
5. Information gathering using tools like Robtex.
6. Scan the target using tools like Nessus.
7. View and capture network traffic using Wireshark.
8. Automate dig for vulnerabilities and match exploits using Armitage
COURSE OUTCOMES:
At the end of this course, the students will be able:
CO1: To express knowledge on basics of computer based vulnerabilities
CO2: To gain understanding on different foot printing, reconnaissance and scanning methods.
CO3: To demonstrate the enumeration and vulnerability analysis methods
CO4: To gain knowledge on hacking options available in Web and wireless applications.
CO5: To acquire knowledge on the options for network protection.
CO6: To use tools to perform ethical hacking to expose the vulnerabilities.
TOTAL:60 PERIODS
TEXTBOOKS
1. Michael T. Simpson, Kent Backman, and James E. Corley, Hands-On Ethical Hacking and Network Defense, Course Technology, Delmar Cengage Learning, 2010.
2. The Basics of Hacking and Penetration Testing – Patrick Engebretson, SYNGRESS, Elsevier, 2013.
3. The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, Dafydd Stuttard and Marcus Pinto, 2011.
REFERENCES
1. Black Hat Python: Python Programming for Hackers and Pentesters, Justin Seitz , 2014.
