ETHICAL HACKING

Paper Code: 
CBCA 601
Credits: 
3
Periods/week: 
3
Max. Marks: 
100.00
Objective: 

The course will enable the students to

  1. Learn the Principles, Techniques of Ethical Hacking.
  2. Understand Tools for Ethical Hacking

Course Outcomes (COs):

Course Outcome (at course level)

Learning and teaching strategies

Assessment Strategies

The students will:

CO252. Describe the legal and ethical requirements related to ethical hacking.

CO253. Analyze the different stages of a cyber-attack.

CO254. Examine the tools for conducting ethical hacking.

CO255. Plan, organize and perform penetration testing on a simple network.

CO256. Determine ways to assess the effectiveness of security policies

and procedures

Interactive Lectures, Discussion, Tutorials, Reading assignments, Demonstrations, Simulation.

Class test, Semester end examinations, Quiz, Solving problems in tutorials, Assignments, Presentation, Individual and group projects and peer review.

 

9.00
Unit I: 

Introduction to Hacking –The Evaluation and Growth of Hacking, Types of Ethical Hackers – Hacktivism –Hacking Methodologies, File Securing Techniques, Ethics and the Law. How is Ethical hacking different from security auditing and digital forensics?

9.00
Unit II: 

IP Addresses- Basic, Classes of IP Addresses, Detecting, Allotment of IP Address, IPV4 and IPV6, IP v4 – Address Space, Notations, Classful addressing, classless addressing and NAT, IPv6 – Structure and Address space, IPv4 – Datagram, Fragmentation, Checksum, Options, Ping and Ping Sweep, Ping Sweeping tools, Nmap introduction

9.00
Unit III: 

Introduction to Foot printing –Steps of Ethical Hacking, Information Gathering Methodology, Goals of Footprinting Process, Types of Foot printing, Foot printing Tools, WHOIS Tools, DNS Information Tools, Locating the Network Range, Meta Search Engines.

9.00
Unit IV: 

Introduction to Scanning –Objectives, three-way Handshake Protocol, Scanning Methodology, Tools, Port Scanning. Introduction to Enumeration, Enumeration Techniques, Enumeration Procedure, Tools.

9.00
Unit V: 

System Hacking-Introduction –Cracking Passwords, Password Cracking Websites, Password Guessing, Password Cracking Tools, Password Cracking Countermeasures, Escalating Privileges, Keyloggers and Spyware

ESSENTIAL READINGS: 

1. Jon Erickson, "Hacking: The Art of Exploitation", No Starch Press, 2003

2. Dafydd Stuttard and Marcus Pinto, "The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws", Wiley, 2011.

3. Georgia Weidman, “Penetration Testing: A Hands-On Introduction to Hacking”, No Starch Press, 2014

 

SUGGESTED READINGS: 

1.Ankit Fadia, “An Ethical Guide to Hacking Mobile Phones” second edition Macmillan India Ltd, 2006.

2.Ankit Fadia,”Network Security: A Hacker's Perspective”, Macmillan Publisher, 2002

3.Raef Meeuwisse, “Cybersecurity for Beginners”, Cyber Simplicity Ltd., 2017.

         4.Charles J. Brooks, Christopher Grow, and Donald Short,” Cybersecurity Essentials”, Wiley, 2018.

REFERENCES: 

Journals

  1. https://dl.acm.org/doi/10.1147/sj.403.0769
  2. http://www.ijcstjournal.org/
  3. International Journal Of Engineering And Computer Science 
  4. http://recentscientific.com/ethical-hacking-need-cyber-security
  5. https://www.ijser.org/researchpaper/

E-Resources

  1.    https://www.javatpoint.com/ethical-hacking-tutorial
  2.    https://www.guru99.com/ethical-hacking-tutorials.html
  3.    https://www.tutorialspoint.com/ethical_hacking/index.htm
  4.    https://www.udemy.com/course/computer-hacking-fundamentals/
  5.    https://www.simplilearn.com/ethical-hacking-tutorial-article

 

Academic Year: