Practicals
Solve This My Practicals list and store each answer in new markdown file. for example : Practical-01.md, ... Practical-11.md
M.Sc.(C.A. & I.T.) SEMESTER - IX 905 : Ethical Hacking [Elective – II]
- Perform Privilege Escalation, Hack the Windows Machine using Metasploit and perform Post-Exploitation using Meterpreter.
- Malware Threats: Gain Access to the Target System using Trojans
- Sniffing: Perform Packet-Sniffing techniques, discover Network Vulnerabilities, Defend against Sniffing Attacks using wireshark.
- Social Engineering: Perform Social Engineering various techniques using Social-Engineer Toolkit (SET), Netcraft, OhPhish.
- Denial-of-Service: Perform Dos and DDoS Attacks using various techniques using Metasploit, hping3, HOIC, and Anti DDoS Guardian.
- Session Hijacking: Perform various session hijacking techniques Zed Attack Proxy, bettercap, Wireshark.
- Evading IDS, Firewalls, and Honeypots: Perform Intrusion Detection using Various Tools like, snort and evading firewalls NMAP Evasion Techniques and bypass firewall rules using HTTP/FTP Tunneling.
- Perform footprint the Web Server using various tools like, Ghost Eye, Skipfish etc.
- Perform a Web Server Attack using Dictionary Attack.
- Perform Footprint the Web Infrastructure using tools.
- Perform Web Application Attacks like Brute-Force, Parameter Tempering, XSS, CSRF using Burpsuite.
- Perform enumerate and Hack a Web Application using WPScan and Metasploit.
- Perform Exploitation of RCE/File Upload Vulnerability.
- Perform gaining Backdoor Access.
- Perform SQL Injection Attacks on an MSSQL Database using sqlmap.
- Perform various SQL Injection Detection Tools.
- Perform Footprint, attacks on Wireless Network.
- Perform attacks on Android Devices.
- Perform S3 Bucket Enumeration using various S3 Bucket Enumeration Tools.
- Encrypt the information using various cryptography tools.