Skip to main content

Practicals

Solve This My Practicals list and store each answer in new markdown file. for example : Practical-01.md, ... Practical-11.md

M.Sc.(C.A. & I.T.) SEMESTER - IX 905 : Ethical Hacking [Elective – II]

  1. Perform Privilege Escalation, Hack the Windows Machine using Metasploit and perform Post-Exploitation using Meterpreter.
  2. Malware Threats: Gain Access to the Target System using Trojans
  3. Sniffing: Perform Packet-Sniffing techniques, discover Network Vulnerabilities, Defend against Sniffing Attacks using wireshark.
  4. Social Engineering: Perform Social Engineering various techniques using Social-Engineer Toolkit (SET), Netcraft, OhPhish.
  5. Denial-of-Service: Perform Dos and DDoS Attacks using various techniques using Metasploit, hping3, HOIC, and Anti DDoS Guardian.
  6. Session Hijacking: Perform various session hijacking techniques Zed Attack Proxy, bettercap, Wireshark.
  7. Evading IDS, Firewalls, and Honeypots: Perform Intrusion Detection using Various Tools like, snort and evading firewalls NMAP Evasion Techniques and bypass firewall rules using HTTP/FTP Tunneling.
  8. Perform footprint the Web Server using various tools like, Ghost Eye, Skipfish etc.
  9. Perform a Web Server Attack using Dictionary Attack.
  10. Perform Footprint the Web Infrastructure using tools.
  11. Perform Web Application Attacks like Brute-Force, Parameter Tempering, XSS, CSRF using Burpsuite.
  12. Perform enumerate and Hack a Web Application using WPScan and Metasploit.
  13. Perform Exploitation of RCE/File Upload Vulnerability.
  14. Perform gaining Backdoor Access.
  15. Perform SQL Injection Attacks on an MSSQL Database using sqlmap.
  16. Perform various SQL Injection Detection Tools.
  17. Perform Footprint, attacks on Wireless Network.
  18. Perform attacks on Android Devices.
  19. Perform S3 Bucket Enumeration using various S3 Bucket Enumeration Tools.
  20. Encrypt the information using various cryptography tools.