VAPT Syllabus

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

VULNERABILITY ASSESSMENT AND

PENETRATION TESTING
Course Title: Vulnerability Assessment and Penetration Testing
Course Code: 22MCAISE4023
Credits Units: 04 Contact Hours: 60 L-T-P: 4-0-0
IA: UE Weightage – 50 : 50 Pass Marks (IA & UE) - 20&20 Aggregate Pass Marks: 50
UE Question Paper Marks: 50

Course Objectives:
COB1 Students will be able to understand the fundamentals on Vulnerability Assessment
COB2 Students will be able to use Assessment techniques to find Vulnerabilities

Course Outcomes:
At the end of the course, students will be able to

Course Bloom’s
Description
Outcome Taxonomy Level
Understand the parts of plan for conducting the Pen test by analyzing
CO 1 L2
suitable metrics.
Apply the kind of Vulnerability by verifying the information gathering
CO 2 L3
process
CO 3 Analyze the verification task to find the vulnerability L4
CO 4 Evaluate techniques to secure the files from vulnerabilities L5
CO 5 Develop programming scripts required in Pen Testing L6

CO-PO-PSO Mapping (3-strong, 2-medium, 1-weak)

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

CO1 3 2 2 2 3
CO2 2 1 1 1 2

CO3 2 1 2 2 1 1 2 1
CO4 2 1 2 1 2 1 1 2
CO5 2 1 1 2 1 2
SYLLABUS:

Tools/Soft
CO PO ware/Dat
Module Topic
Mapping Mapping abase
Used
Pentest Planning, Metrics and Management Scope
Pentest Overview, Planning and scoping, Penetration
Testing Methodology, Planning Penetrates of
PO-1
Engagement, Legal Concepts, Testing Strategies,
White Box Support Resources, Types of Assessments, PO-2
1
Threat Actors, Target Selection, Quantitative, CO1 PO-5
(12 Hrs)
Qualitative, and Mixed Methods; Quantitative PO-6
Analysis, Qualitative Analysis, Mixed Method
Analysis. Current Methodologies; Project
Management Institute, ISSAF, OSSTMM, Tool-
Generated Reports.
Vulnerability Identification and Information
Gathering
Introduction: Information Gathering, Passive
Information Gathering; Web Presence, Corporate Data,
WHOIS, DNS Enumeration, Additional Internet
Resources. Active Information Gathering; DNS
Interrogation, E-mail Accounts, Perimeter Network PO-3
2 Identification, Network Surveying. Project CO2 PO-4
(12 Hrs) Management; Executing Process Phase, Monitoring
and Control Process. Vulnerability Identification, Port PO-7
Scanning; Target Verification, UDP Scanning, TCP
Scanning, Perimeter Avoidance Scanning. System
Identification; Active OS Fingerprinting, Passive OS
Fingerprinting, Services Identification; Banner
Grabbing, Enumerating Unknown Services.
Vulnerability Identification.
Vulnerability Verification and Privilege Escalation
Introduction, Exploit Codes – Finding and Running;
Internet Sites, Automated Tools, Fuzzing, Code
Review, Application Reversing.Web Hacking; SQL
Injection, Cross-Site Scripting, Web Application PO-8
Vulnerabilities. Project Management; Executing PO-9
3 Process Phase, Monitoring and Control Process. CO3 PO-10
(12 Hrs) Compromising a System, System Enumeration;
Internal Vulnerabilities, Sensitive Data. Network PO-11
Packet Sniffing. Social Engineering; Baiting, Phishing,
Pretexting. Wireless Attacks; Wi-Fi Protected Access
Attack, WEP Attack, Privilege Escalation (Linux &
Windows, Lateral Movement, Persistence.
Marinating Access and Covering Tracks
Shells and Reverse Shells; Netcat Shell, Netcat
Reverse Shell. Encrypted Tunnels; Adding a Host
Firewall, Setting Up the SSH Reverse Shell. PO-9
4
Encryption and Tunnel Methods. Introduction to CO4 PO-10
(12 Hrs)
Covering Your Tracks, Manipulating Log Data, PO-12
Application Logs. Hiding Files; Hiding Files in Plain
Sight, Hiding Files Using the File System, Hiding
Files in Windows.
Penetration Tools and Reporting
Overview-Penetration Testing Tools ,Nmap Usage,
Use Cases for Tools, Scanners, Credential Testing
Tools, Password Cracking, Debuggers, Software
Assurance, OSINT, Wireless, Web Proxies, Social
Engineering Tools, Remote Access Tools, Networking
5 Tools, Mobile Tools Miscellaneous Tools, Intro to PO-9
Programming, Programming Concepts, BASH Script CO5 PO-10
(12 hrs)
Example, Python Script Example, PowerShell Script
PO-11
Example, Ruby Script Example. Reporting and
Communication; Overview- Reporting and PO-12
Communication, Pentest Communications, Report
Writing, Mitigation Strategies, Post-Report Activities,
Pentest Report Example.

Text Books

Professional Penetration Testing Creating and Operating -a Formal Hacking Lab, Syngress
1.
2015.

2. Ethical Hacking and Penetration Testing Guide-RafayBaloch, Taylor and Francis Group,
2015

References Books:
1. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing
Made Easy by Patrick Engebretson, Syngress; 2 editions (12 September 2013).

You might also like