2020-21
MALLA REDDY ENGINEERING COLLEGE B.Tech.
Onwards
(Autonomous) VI Semester
(MR-20)
Code: A6209 L T P
ETHICAL HACKING
Credits: 3 3 - -
Prerequisites:
A course on “Operating Systems”
A course on “Computer Networks”
A course on “Network Security and Cryptography”
Course Objectives:
The aim of the course is to introduce the methodologies and framework of ethical
hacking for enhancing the security.
The course includes-Impacts of Hacking; Types of Hackers; Information Security
Models; Information Security Program; Business Perspective; Planning a Controlled
Attack; Framework of Steps (Reconnaissance, Enumeration, Vulnerability Analysis,
Exploitation, Deliverable and Integration)
MODULE – I: Introduction
Hacking Impacts, The Hacker Framework: Planning the test, Sound Operations, Reconnaissance,
Enumeration, Vulnerability Analysis, Exploitation, Final Analysis, Deliverable, Integration
Information Security Models: Computer Security, Network Security, Service Security,
Application Security, Security Architecture Information Security Program: The Process of
Information Security, Component Parts of Information Security Program, Risk Analysis and
Ethical Hacking
MODULE – II: The Business Perspective
Business Objectives, Security Policy, Previous Test Results,
Business Challenges Planning for a Controlled Attack: Inherent Limitations, Imposed
Limitations, Timing is Everything, Attack Type, Source Point, Required Knowledge, Multi-
Phased Attacks, Teaming and Attack Structure, Engagement Planner, The Right Security
Consultant, The Tester, Logistics, Intermediates, Law Enforcement
MODULE – III: Preparing for a Hack
Technical Preparation, Managing the Engagement Reconnaissance: Social Engineering, Physical
Security, Internet Reconnaissance
UNIT – IV: Enumeration
Enumeration Techniques, Soft Objective, Looking Around or Attack, Elements of Enumeration,
Preparing for the Next Phase Exploitation: Intutive Testing, Evasion, Threads and Groups,
Operating Systems, Password Crackers, Root Kits, applications, Wardialing, Network,
Services and Areas of Concern
UNIT -V: Deliverable
The Deliverable, The Document, Overal Structure, Aligning Findings, Presentation Integration:
Integrating the Results, Integration Summary, Mitigation, Defense Planning, Incident
Management, Security Policy, Conclusion
TEXT BOOK
James S. Tiller, “The Ethical Hack: A Framework for Business Value Penetration
Testing”, Auerbach Publications, CRC Press
REFERENCE BOOKS
EC-Council, “Ethical Hacking and Countermeasures Attack Phases”, Cengage Learning
Michael Simpson, Kent Backman, James Corley, “Hands-On Ethical Hacking and
Network Defense”, Cengage Learning
Course Outcomes:
Gain the knowledge of the use and availability of tools to support an ethical hack
Gain the knowledge of interpreting the results of a controlled attack
Understand the role of politics, inherent and imposed limitations and metrics for planning
of a test
Comprehend the dangers associated with penetration testing
CO- PO, PSO Mapping
(3/2/1 indicates strength of correlation) 3-Strong, 2-Medium, 1-Weak
Programme Outcomes(POs) PSOs
C PO PO PO PO PO PO PO PO PO PO PO PS PS PS
O sPO 0
1
1
1
2
1
1
O
2
O
3
O
CO 1 1 1 1 1 1 1
CO 1 2 2 2 1 1 1 2
CO 1 1 1 2 1 1 1 1
CO 1 1 1 1 1 1 1 1 1
CO 1 2 2 2 2 2 2 1 3