UNIT I – Introduction and Footprinting.
-
Define ethical hacking and explain its importance in cybersecurity.
-
Explain the steps involved in ethical hacking with examples.
-
What is footprinting? Differentiate between Internet footprinting and scanning.
-
Explain the process of basic banner grabbing.
-
Discuss the enumeration of common network services with examples.
-
Describe the significance of network security monitoring.
-
Explain how file and folder permissions can be secured in Windows.
-
What is the encrypting file system (EFS) and how does it enhance security?
-
Explain how enumeration helps in penetration testing.
-
Discuss a case study on network security monitoring and securing permissions.
UNIT II – Dial-up, PBX, Voicemail, and VPN Hacking
-
Describe the process of preparing for a dial-up connection in hacking scenarios.
-
What is war-dialing? Explain its working with an example.
-
Explain brute-force scripting in the context of password cracking.
-
Discuss methods of voicemail hacking and their prevention.
-
Explain VPN hacking techniques and countermeasures.
-
How can network devices be discovered? Describe any two methods.
-
Explain Autonomous System Lookup and its role in reconnaissance.
-
Discuss the use of public newsgroups in gathering information for hacking.
-
What is network vulnerability detection and why is it important?
-
Explain how to detect Layer 2 media in a network.
UNIT III – Wireless Hacking and Firewalls
-
Explain the concept of wireless footprinting and its purpose.
-
Describe wireless scanning and enumeration techniques.
-
Discuss how attackers gain unauthorized access to wireless networks.
-
Explain tools used for exploiting WEP weaknesses.
-
What is a Denial of Service (DoS) attack? Explain its motivations.
-
List and explain the types of DoS attacks.
-
Discuss firewall identification and techniques to scan through firewalls.
-
Explain application proxy vulnerabilities in firewall systems.
-
Compare UNIX and Windows-based DoS attacks.
-
Explain packet filtering in firewalls with an example.
UNIT IV – Remote Control Insecurities and Malicious Programs
-
Discuss methods to discover remote control software in a network.
-
Explain weaknesses in VNC and their exploitation.
-
Describe security issues in Microsoft Terminal Server and Citrix ICA.
-
What is session hijacking? Explain any one advanced technique.
-
Define backdoors and explain how they are used by attackers.
-
Explain the working of Trojans and their impact on system security.
-
Discuss preventive measures against session hijacking.
-
How can administrators detect hidden backdoors in systems?
-
Compare remote control insecurities between corporate and home networks.
-
Explain any one real-world case study of Trojan attacks.
UNIT V – Cryptography, Social Engineering, and Web Hacking
-
Explain the role of cryptography in ethical hacking.
-
What is social engineering? Give examples of common attack techniques.
-
Describe the process of subverting the system environment.
-
Explain common methods of web server hacking.
-
Discuss vulnerabilities in web applications and their exploitation.
-
What is malicious mobile code? Give examples and preventive measures.
-
Explain SSL fraud and its impact on secure communication.
-
Describe methods of email hacking and possible defenses.
-
Explain IRC hacking and its potential risks.
-
Discuss global countermeasures to protect internet users from hacking.