B.Voc CS-3
B.Voc CS-3
Student profile
Roll
S No No Reg No. Student Name Category Contact No.
1 17201 5111-2020-1686 azadvir singh BC 9877712180
2 17202 5111-2020-1687 Mandeep Singh general 8194998360
3 17205 5111-2020-1690 pankaj lohan general 9896523453
4 17207 5111-2020-1692 Udham Singh BC 7888338454
5 17208 5111-2020-1693 Sukhvir Singh BC 7710435329
6 17210 5111-2020-1695 sukhram singh BC 7082615019
7 17213 5111-2020-1698 goldy singh sc 9815720996
8 17218 5111-17.850 sarbjeet singh sc 9914071537
9 17222 5111-2020-1691 parwinder singh BC 9878124743
10 17223 5111-2020-1659 simrandeep singh sc 9729335184
11 17225 5111-2020-1683 sunny kumar sports 9608824392
12 17226 5111-2020-1596 nitish kumar sports 9234945457
2.
2.Time table
3. Syllabus
B.VOC( Cyber Security) 3rd Year ( 5th and 6th Semester)
2022-23
Componen Credit University Internal Max. Exam.
Code Title of t s Examinatio Assessmen Mark Duratio
Paper n t s n Hours
General
B.VCS Presentation 4.5 60 40 100 3
-311 Skills and
Personality
Developmen
t
General
B.VCS Ethical 4.5 60 40 100 3
-312 Hacking-
Level 3
Skill
B.VCS Penetration 4.5 60 40 100 3
-313 Testing
Skill
B.VCS Cloud 4.5 60 40 100 3
-314 Computing
General
B.VCS Software 4.0 50 50 100 3
-315 Lab – IX
Skill
B.VCS Software 4.0 50 50 100 3
-316 Lab – X
Skill
B.VCS Software 4.0 50 50 100 3
-317 Lab – XI
Total 30 390 310 700
1. The breakup of marks for the internal assessment for theory Subjects will be as under:
i. Average of Both Mid Semester Tests / Internal 24 Marks
Examinations
i. Attendance 8 Marks
i. Written Assignment/Project Work etc. 8Marks
B.VCS- 312 Ethical Hacking-Level 3
The question paper will consist of three sections A, B and C. Each of sections A and B
will have four questions from the respective sections of the syllabus and each question carry 9
marks. Section C will consist of one compulsory question having 12 parts of short-answer type
covering the entire syllabus uniformly and each question will carry 2 marks.
Candidates are required to attempt two questions each from section A and B and the entire
section C.
SECTION-A
IDS/IPS and Honey pots: Rules for IDS/IPS, Honey pots Detection, Evasion Techniques, Security
Measures for IDS, Unified Threat Management (UTM), Rules set for UTM, Virtual Private Network
(VPN), Network Vulnerability Assessment Automated & Manually
Android Ethical Hacking & Security: Ethical Hacking Practical on Smartphone, Securing your Android
mobile from being hacked, Cyber Threats for Mobile, Android Rooting and Testing for Exploits,
Securing your family with Android Apps, Smartphone Data Recovery
Web Server Ethical Hacking: Types of Web servers and their Security, Web Server Enumeration,
Attacking a Web server, Directory Traversal attack, Methodology for Web server attack, Using HT Track
to find backdoor in Web server, Testing the Payload on server, Brute force attack, Security and Defending
against Web Server Attacks, Upgrading a Web server
Session Hijacking Ethical Hacking: Session Hijacking, Process of Session Hijacking, Types of Session
Hijacking, Testing for Session Hijacking, Browser Hijacking, Coping with Session Hijacking, Coding
Standards and Session Management, Evaluating the Cookies
Advance Google hacking: Advance Google hacking, Google Hacking Database, Google Dorks for SQL
and Advance SQL Injection, Enumerating the Website’s Security & Publicly Available Data, Deep Web
vs Dark Web
SQL Injection: SQL Injection, Case Studies, SQL Injection Technologies, Types of SQL Injection, Steps
to Perform SQL Injection, Advance SQL Injection, SQL Injection Tool-Kit, Security Methods against
SQL Injection
SECTION-B
Web Application Ethical Hacking: Architecture of a Web Application, Hacking Threats for a Web
Application, Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF), Data Storage and
Functionality testing of a Web Application, Detecting a Web Application Attack, Vulnerability Testing
Tools, Security against Web Application Attack
Shell: Shell Injection, Local File Inclusion (LFI) & Remote File Inclusion (RFI), Live Demonstration of
Shell Injection on Web Server, Evaluating the Coding Standards
Tamper data: Intercepting between Server and Client Side, Understanding the GET and POST, Burp Suit
& OWASP ZAP, Tampering Website’s Data
Securing a Website: Web Application Firewall Introduction, AWS Web Application Firewall and
Another Popular Firewall, Input Validations, Sanitisation the Input, Website Vulnerability Assessment
Automated & Manually
Cloud Computing Ethical Hacking: Services of Cloud Computing, Loop Holes in Cloud Computing,
Attack Methods for Cloud Services, Securing the Cloud (Manually and with Tools), Using Cloud Service
for DDOS Protection and Session Hijacking
Practice Sets for Website Ethical Hacking: Bwap, Word Press Website Hacking, Dam Vulnerable
Application, OWASP Top 10 Vulnerability
Reference Books:
1. web Server Ethical Hacking.IDS/IPS and Honey pots: Rules for IDS/IPS, Honey pots
Detection
2. Evasion Techniques, Security Measures for IDS
3. Unified Threat Management (UTM), Rules set for UTM
4. Virtual Private Network (VPN)
5. Network Vulnerability Assessment Automated & Manually
6. Android Ethical Hacking & Security: Ethical Hacking Practical on Smartphone
7. Securing your Android mobile from being hacked
8. Cyber Threats for Mobile, Android Rooting and Testing for Exploits
9. : Types of Web servers and their Security, Web Server Enumeration
10. Attacking a Web server, Directory Traversal attack
11. Methodology for Web server attack, Using HT Track to find backdoor in Web server
12. Testing the Payload on server, Brute force attack
13. Security and Defending against Web Server Attacks
14. Upgrading a Web server
15. Session Hijacking Ethical Hacking: Session Hijacking, Process of Session Hijacking, Types
of Session Hijacking, Testing for Session Hijacking
16. Browser Hijacking, Coping with Session Hijacking
17. Coding Standards and Session Management, Evaluating the Cookies
18. Advance Google hacking: Advance Google hacking, Google Hacking Database
19. Google Dorks for SQL and Advance SQL Injection, Enumerating the Website’s Security &
Publicly Available Data, Deep Web vs Dark Web
20. SQL Injection, Case Studies, SQL Injection Technologies
21. Types of SQL Injection, Steps to Perform SQL Injection
22. Advance SQL Injection, SQL Injection Tool-Kit, Security Methods against SQL Injection
23. web Application Ethical Hacking: Architecture of a Web Application
24. Threats for a Web Application, Cross Site Scripting (XSS)
25. Cross Site Request Forgery (CSRF)
Teaching
Date Class Subject Topics covered
aids used
web Server Ethical Hacking.IDS/IPS and
B.Voc Ethical White
04-10-2022 Honey pots: Rules for IDS/IPS, Honey pots
(CS)-3 Hacking board
Detection
B.Voc Ethical Evasion Techniques, Security Measures for White
06-10-2022
(CS)-3 Hacking IDS board
B.Voc Ethical Unified Threat Management (UTM), Rules White
07-10-2022
(CS)-3 Hacking set for UTM board
B.Voc Ethical White
08-10-2022 Virtual Private Network (VPN)
(CS)-3 Hacking board
B.Voc Ethical Network Vulnerability Assessment White
10-10-2022
(CS)-3 Hacking Automated & Manually board
B.Voc Ethical Android Ethical Hacking & Security: Ethical White
12-10-2022
(CS)-3 Hacking Hacking Practical on Smartphone board
B.Voc Ethical Securing your Android mobile from being White
13-10-2022
(CS)-3 Hacking hacked board
B.Voc Ethical Cyber Threats for Mobile, Android Rooting White
15-10-2022
(CS)-3 Hacking and Testing for Exploits board
B.Voc Ethical : Types of Web servers and their Security, White
17-10-2022
(CS)-3 Hacking Web Server Enumeration board
B.Voc Ethical Attacking a Web server, Directory Traversal White
18-10-2022
(CS)-3 Hacking attack board
B.Voc Ethical Methodology for Web server attack, Using White
19-10-2022
(CS)-3 Hacking HT Track to find backdoor in Web server board
B.Voc Ethical Testing the Payload on server, Brute force White
20-10-2022
(CS)-3 Hacking attack board
B.Voc Ethical Security and Defending against Web Server White
21-10-2022
(CS)-3 Hacking Attacks board
B.Voc Ethical White
22-10-2022 Upgrading a Web server
(CS)-3 Hacking board
Session Hijacking Ethical Hacking: Session
B.Voc Ethical Hijacking, Process of Session Hijacking, White
27-10-2022
(CS)-3 Hacking Types of Session Hijacking, Testing for board
Session Hijacking
B.Voc Ethical Browser Hijacking, Coping with Session White
28-10-2022
(CS)-3 Hacking Hijacking board
B.Voc Ethical Coding Standards and Session Management, White
29-10-2022
(CS)-3 Hacking Evaluating the Cookies board
B.Voc Ethical Advance Google hacking: Advance Google White
31-10-2022
(CS)-3 Hacking hacking, Google Hacking Database board
Google Dorks for SQL and Advance SQL
B.Voc Ethical Injection, Enumerating the Website’s Security White
01-11-2022
(CS)-3 Hacking & Publicly Available Data, Deep Web vs Dark board
Web
B.Voc Ethical SQL Injection, Case Studies, SQL Injection White
02-11-2022
(CS)-3 Hacking Technologies board
B.Voc Ethical Types of SQL Injection, Steps to Perform White
04-11-2022
(CS)-3 Hacking SQL Injection board
Advance SQL Injection, SQL
B.Voc Ethical White
05-11-2022 Injection Tool-Kit, Security Methods against
(CS)-3 Hacking board
SQL Injection
B.Voc Ethical web Application Ethical Hacking: White
07-11-2022
(CS)-3 Hacking Architecture of a Web Application board
Threats for a Web Application, Cross Site
B.Voc Ethical White
09-11-2022 Scripting (XSS), Cross Site Request Forgery
(CS)-3 Hacking board
(CSRF)
Hacking Data Storage and Functionality
B.Voc Ethical White
10-11-2022 testing of a Web Application, Detecting a Web
(CS)-3 Hacking board
Application Attack,
B.Voc Ethical Vulnerability Testing Tools, Security against White
11-11-2022
(CS)-3 Hacking Web Application Attack board
B.Voc Ethical Shell: Shell Injection, Local File Inclusion White
12-11-2022
(CS)-3 Hacking (LFI) & Remote File Inclusion (RFI) board
B.Voc Ethical Live Demonstration of Shell Injection on Web White
14-11-2022
(CS)-3 Hacking Server, Evaluating the Coding Standards board
B.Voc Ethical Tamper data: Intercepting between Server and White
15-11-2022
(CS)-3 Hacking Client Side board
B.Voc Ethical Understanding the GET and POST, Burp Suit White
16-11-2022
(CS)-3 Hacking & OWASP ZAP, Tampering Website’s Data board
B.Voc Ethical Securing a Website: Web Application Firewall White
17-11-2022
(CS)-3 Hacking Introduction board
B.Voc Ethical AWS Web Application Firewall and Another White
18-11-2022
(CS)-3 Hacking Popular Firewall, board
B.Voc Ethical White
19-11-2022
(CS)-3 Hacking Input Validations, Sanitisation the Input, board
B.Voc Ethical Website Vulnerability Assessment Automated White
21-11-2022
(CS)-3 Hacking & Manually board
Services of Cloud Computing, Loop Holes in
B.Voc Ethical Cloud Computing, Attack Methods for Cloud White
22-11-2022
(CS)-3 Hacking Services, Securing the Cloud (Manually and board
with Tools)
B.Voc Ethical Using Cloud Service for DDOS Protection and White
23-11-2022
(CS)-3 Hacking Session Hijacking board
24-11-2022 B.Voc Ethical Bwap, Word Press Website Hacking, Dam White
Vulnerable Application, OWASP Top 10
(CS)-3 Hacking board
Vulnerability
17222, 17207
Best assignment