Program Distribution List
Program Distribution List
No. of
S.No Topic Labs/Date
No. of
S.No Topic
Labs
1 LAB6
2 4
3 2
4 3
5 2
6 3
7 2
8 3
9 2
10 3
LAB1
7 Implementation of resource allocation graph RAG)
No. of
S.No Topic
Labs
No. of
S.No Topic
Labs
hosts.
the-Middle scenario.
No. of
S.No Topic
Labs
actions.
File Inclusion Vulnerabilities: Explore remote and local file
inclusion vulnerabilities in DVWA. Show how
4 attackers can include malicious files on a server and execute LAB2
arbitrary code.
Brute-Force and Dictionary Attacks: Use DVWA to simulate
login pages and demonstrate brute-force
5 and dictionary attacks against weak passwords. Emphasize LAB2