0% found this document useful (0 votes)
151 views

Ethical Hacking PDF

This document provides information about AJK College of Arts and Science. It states that the college is ISO 21001:2018 certified and affiliated with Bharathiar University in Coimbatore. It is recognized by the University Grants Commission under Sections 2(f) and 12(B) of the UGC Act. The document provides the college website and contact information.

Uploaded by

Praveen Sathya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
151 views

Ethical Hacking PDF

This document provides information about AJK College of Arts and Science. It states that the college is ISO 21001:2018 certified and affiliated with Bharathiar University in Coimbatore. It is recognized by the University Grants Commission under Sections 2(f) and 12(B) of the UGC Act. The document provides the college website and contact information.

Uploaded by

Praveen Sathya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

ARTS AND SCIENCE

A AJK ARTS AND SCIENC


1ARR A
AnIso21001:2018 Certificd
A
Institution

Go. of TemiNedu Recognid by


Palskkad Niain ead

wnww.alkcas.cOn NAAC
AnIs02100112018
Dy
*o
CertilledinstltatlonAn
Afated to Blinrothlar University, Colmbnto
dovt of TamilHndu, RecogniInd y
Under Snctlon 2(f) mned 12
to-Srosly (oller
M d
mi" indu- 841105
At
UGC New Dei Under Secton a"OdA 3S01700
A/ojkoollodo www.aJkoas.uom
8/a]keollege
/ajkinstitutions
Ph: O422 /ojkinatitutions Ph: 0422 3501700
NAAC
ETHICAL HACKING
1: Obtain a Kali Linux installer, Ubuntu installer and an Arch linux Installer and
make successful installation of each OS, then take a screenshot and paste it in the
below page.

Con#rgnuin tals Luur 10Marks.

Appliance settings

You can enanae many ofte propertes ohowm by dovtie aoor on rereme d
Deow.
s so
Vrtual Systenn
b o r - a m d 6 4

D Product-URRL https://mw.kal.org/
dor Orfens* s*cury
e n d o r - O R U

rtps www.-offensNe-seCunycom
Rolling 2 0 1 8 ) x e
Veriior
e c r i p t i o n Kati Roling 2 0 1 8 ) 5 -
ome rode c

mOC~*a.
"
*"**

ETHICAL
mochne) mod.ned.
C ernar IaISH OAS\irtualBox VMs
1AC Addreia Poucy: n d u d e o n y A T n e w o k d a p t e r MAC »ddresses

Adduonal Opuon: ImPort hard drrves as vDI

pplance i not o n E

Restoreoefasta Limeer C~ce

HACKING dse
Ni1Ikonneni aienvenuc Re lcoat Aospo naaiaea
UP. D0HN and ENTER.KeUE

1ands
Suom
ch,
to
selcct you 1ansuase.
Relkonu

LatveOkm

buntu
Confiqu'ng
enrapl (
AJ eNetten ain
AT AnIS02100112018
Athiated
Certinedlnstttotlon Palusd Main
to nlinnthiarunivarsil Cnimhtare
Poaf
amit aduGimyt
A
AREsO200L: 018Cecdud Nmattae Unc Naw Daihi o Tamilindis naeinind by 441109
i a n 2t) and i 2 )

A/njkeolileg /ajkinstitutions www.alkca9.co


NAAC NAAC
Www.akcaacom

Ph: 0422 3501709

Output:

tnvespay
nlaut
kal nu

archlinux. A STple, bghoveight indmbuson

rch Linux

KALIT Doot cxisting OS


Run Memtest86 (RAM test)
HO Ormation (HDT
Pouer orf

Pom The a bove u t, The al


Te be low mage b u tu opeta h
TA /inwx, U bun tu and The a) eh ( nUr a
Syctem Sutars fully Tny tal/ed,
Su cear fuly Pu talle dandTs Sa e n shot
0 bun tu ope a y y ei
+ e au
ale lis ted.

STAFF IN-CHARGE
'AJK RIAND SCIL NCI
AntSo2IO61:S01B Ortedwtiwllen almkhedelie
N'An Ren A An AJK ARTSAND SCILNCE
I902100112010 Cerlifledinstitutlon

basic
ti akoihegr
EXERCISE 2:Open an account
Atio
in
Ph 0422-3 601700
the Hack the
Box Web
NAAC
plattorm and perlorm a ree
u y
Hw
attamilia nimiyatnse
ot
UhUnder saetion 210 and
12
L1/njkeollo gn )/ajkinstitutions
Paivdarai Ci
Tamil Madu
www.alkaos.0om
Ph: 0422 3601700
641 105 A
pentesting and write the report below. NAAC
pO Haet h box 10Marks.

HACKTHEBOx ANE

HACKTHEOOXX

HACIKTHEBOX

The a bon Penelz aon


denga
Th
Can be Su c Fuly pefoA mu e l n
Opon The e pon e Iva hon
tehne
tuk and gómpls G b y The twal k Thou h
Hart 7 oX

o n by Tho hat t Tu
Lo

AJKCAS DIGITAL &CYBER FORENSIC 75OF-88


SCIENCE/WB/2022-2023/EVEN-SEMESTER-PAGE 740F-88 AJKCAS-DIGITAL &CYBER FORENSIC
sCIENCE/WB/2022-2023/EVENSEMESTERPAGE
NID Cl N
AJK
AnEso21e01&E018 Cetinedtnstittien iakhnd Maln Rond A+ SAJK S AND SCIENCE

ac w Unse Satten a n r1 a n

kinatitutiona
Www.alkcas.com

Ph: 0422 3501700 NAAC


An
Approved
to
Bharethiar
tn-C/asdy (oleu
IS021001:2018CertledInstitutlon
Atntinted
uao, New Deihi Undars d u Recogniund

A/njkoollego
nctlon 2(f) and
Palavknd Mein Rgad
University. Coimbntor y
12(8)
Tamil
Tamil Nadu-641

www.aJkcas.com
Nadu 4411 105
A
/njuinstitutions Ph:
EXERCISE 3: Install Burpsuite 0422 3501700
NAAC
OUTPUT: Community Version and use to perform MITM attack
and write the report below. a

Ras'e ro Tan tios o d n n The 10Marks.


FIT Tto t Bwpsw (omm unr G
hatk bok ale paIfo mu d Aucurdufl . Pnd
Vosion
spe au di play Ldtthe Scuundaot.
Coniqu4e Bup SuiG
Bup Sut cwas Con#igwred as a
pLo y
be l u n The ellent and The Seve

=Tnta upt nefoost a t t i


Ho d p urd to ín t e a p t k n Aoo! t

ratfic be fwus elie nt and The Seu vel

T and Raspon a :
Modify loapu e

Keau and epon wee Nod a

4o fe The appltse t oo

aN N ITN tacl

STAFF IN-CHARGE

AJKCAS DIGITAL & CYBER FORENSIC ScIENCE/WB/2022-2923/FYFN SFMFSTFRPanF F:88 A I K G A S nIGITAL B GYBER FORENSIC
SCIENCE/WB/2022-2023/EVEN-SEMESTERPAGE 77-0F-88
COLLTGI OI

`AJK ARTSANDSCINCI
A SAJK .
An IS021001 2018 CNtinedtnstiao
A a d te Rhertia: UNNAiTC
ANd Gt oTiN
vcc New DeN UNderS
/alkcolege
inatTution
Atair

www.ajkc0s.com
Ph: 0422 3501
Ph:0422
m Rond

NVaherni Colmbatere
Taml NAdu-¢41 1 0 9

3601700 NAAC
An5021001:2018
rar
CeruleA iesnn
rirses im A
oUTPUT: NAAC
Tho pohey ojo d
web appliea fion d d no7 ,
wsics Bwpuu tommur
S oncy pt nolaol k afe
UOe

to NTTH attat
Vul huo bit
made Vu lu ab le

Tha ould be ar pio fu i


S on a c bing eccmrut
The midAle
The Appicaon d d not implumit
olaiens pLorid: d n
Neanes to
Pre veyt sesiOn jat W
my prEva
e plam esTed
Lsh, h mads vuluable to attsc cheo a

an
Atacke Coudd t ko oye ay Jen bul

STAFF IN-CHARGE
ninatitttona Ph 0429 JBO1rO0
H/ajkectere

hack androld devices remotely and wrlte The


EXCERCISE 4: Use Metasploit Framework to USO N ta lu The
Pphcation
a detailed report on the attack.
10Marks. no-los pa edes Somion will be opeu

ms7ronom.
Oy vencueing a payload ing 4 ?ll
so That ue
e n t e r ínq holp Corm man d, ueh

3 t , Jihe ep 7he kali u nue


A optioN to onde ?nto The an du oid duta.
malicious payoad. A 7he
9enea k an apk ¢ile as

nud t cluek local 2P oi ail The P}le


Pp haf", 7
ou
we
TYPe
kos¥ e
Aftes Sethng
(ocal Tp
you
pplitio
to p e u a t
to ol That eorln 9eneuata apaylvad
Ehantia Contset o r doi
Anduoid dwiu

leveyse-
Deuico
msfven om -p anodu oid /meteputes tp TRL Command w

LtoS7 =
(92. 168. o. t13 LpoT 444 4 vau/wwul
motu p etas dlump torac
htrmll ekatbi'nq. aPk
w f N o a l l The con tu eG o

mobt oliiu.
Sond Ke malu uou appuca tion to 7he

augetod devite. nod ma te Suwe That Th


defco 6 ntaluo an The anola o id lu vrce.
EXERCISE 5: Use Metasploit Framework to hack
windows devices remotely and write
a detailed report on the attack.
By
By ing me tu plo a m e cwol te.

10Marks.
e ansdacd dv'e Aa beun
m 1 WoguumenG kal linux, windows os

a c c ad and lowh (oa d vinutu al Machinos


ewe Can
np
les TLom and oid den'
Slop a f uP you kal linue and ndouws
Systems a two virual Nachi'nes.

step FAe ap eheek youu 2p of kal

Ma ch°ne #oL fuThe use-

kali linux
tep 8: T The Heumino) window of
tpe " msfcoso2 Theyw t for i t to ope

terminal condpso CAT pay load c i

m9f renoM".

Slep : * aenom condo co type Te

lommand a beloo
msrenom P ondo s/moerpae fer eve Do trt

poRY449 f
By in
uling Modas plo am wol
LHot 9-168-. to7 Oindowc macki' has bsn
viehm.exe"
umo
eYe root Des ktop
a Coned Omd w2 Pm urmodaly doon
Now i msfConso le fa use Th nll fileu tem TKO ind ws machih.
sHep s
Command
ma te ' s e se fo 7RA Con nechn

Step 6 : Now stwiteA al to cwa The

The mefes pufu oped o nobt

wTh The 2ve 9e en9Iu Con ne cbhon Lo m


T Vich mach n

post epioita trhn


rlour un/Lelb Commandi o
a m A u f o r The wihd ous maeh.

SoTnto, uplo ad, dolo a.

STAFF IN-CHAR
NAAC aB.com
8akeollege /ajkinstituttons Ph 0422-BO17O /ajkinetitutionsPh:0422-3501700 NAAC
EXERCISE 6: Use ADB to take image of a smartphone internal storage for forensic
lc
analysis purpose. Oxt cwe hud to tranteu TLe two andls o P
10Marks. oppsto TLe duo u
o doon loa o and Tn Sta tl A DB

duopu websa. adb- i N tat nyooof .apk


o m TL anduod
aolb d
PusybOx c p .
Next downlb ad 2 apk l e t Yo
ets CohN ct to Th pko A
ferente woltcto tion.
adb -d s t

ngoLoof tool t root anduo


Su
p hoe Lsl
Busy bo - to Copy and
partro Gn T davis
Ledto chsct
data fLOm ThL P ho h .
Cat ploc pas o u

ApB T talud ConLcf anou oid cklko |BuyLox nc--p


dd ip- lduol blocb /mm
phone and oper

Oommand
SR HERE PIPd t u
T
cotbe
d r tce
adb dicos anduo r .dd '

yo k o ul d S So u7h1 y ke 8ss> andt ordd


T follo wt hct97 00

ltst o etica atta o

4200S00 I 661 duyr


Aneh aa mad eraeniresty Tai
Nadu. na1 10
Www.nJicono.ooN
DehiUnder Sectton a n d
1
c N nJkinatitutionnP: 0422 3B01700 NAAC
Output:

7he output ke

on Ta ble CEP)
OT o T D parh
ofse Seco O

On G aen S1A -
by Sec tot s.

Slot end
O0Oo o

You might also like