05CS2203 MSc CS 2 - Web Penetration Testing
05CS2203 MSc CS 2 - Web Penetration Testing
No of
Unit
Topics Covered lectures
No
required
1 Introduction of penetration testing 8
3 Authentication attack: 13
▪ Course Outcomes :
1. Understand web basics and web applications
2. Recognize the techniques of Web hacking
3. To identify security vulnerabilities and weaknesses in the target
applications
4. To identify how security controls can be improved to prevent hackers
gaining access to operating systems and networked environments.
5. Apply fundamental principles of problem solving in software engineering.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1
0 1 2
CO1 L M H M L M L M L M M M
CO2 L H M L H L M M L H M M
CO3 M H M H M M L M M M H L
CO4 M M H M L H M L M H H M
CO5 H M H M H H H H M H H H
Text Book :
1. Web Penetration Testing with Kali Linux, Joseph Muniz & Aamir Lakhani,
ISBN-13: 978-78216-316-9.
2. Practical Web Penetration Testing, Gus Khawaja, ISBN-13:
978-1-78862-403-9.
Reference Books :
▪ Web References :
1. https://www.tutorialspoint.com/web_application_penetration_testing/ind
ex.asp
3 Book 1: Chapter 5
4 Book 1: Chapter 6 and 7
5 Book 1: Chapter 8 Book 2: Chapter 7
FACULTY OF COMPUTER APPLICATIONS
Master of Science – Cyber Security and Cyber Law
PRACTICALS
Sr. No List of Practical
1 Building a Vulnerable Web Application Lab: installing mutillidae,
DVWA, BWAPP and installing Klai Linux in virtual box.
2 Intercepting the requests/responses using Burp Proxy
Setting the proxy in your browser
BURP SSL certificate
Burp Proxy options
Fuzzing web requests using the Intruder tab
3 Perform a file inclusion attack
Remote File Inclusion
Local File Inclusion
4 Executing Cross-Site Scripting attacks
Reflected XSS
Stored XSS
Exploiting stored XSS using the header
DOM XSS
JavaScript validation
5 Perform SQL Injection attack using SqlMap
Authentication bypass
Extracting the data from the database
Error-based SQLi enumeration
Blind SQLi
6 Cross-Site Request Forgery using Burp Suit and Mutillidae as the
target
7 Using automated tools to scan web applications for vulnerability
(acunetix and Open Vas)
8 Using known exploits to exploit web applications (Metasploit).
9 Cookie Theft/Session Hijacking using firesheep
10 Executing MITM attack to grab username and password of non-ssl
traffic.
Executing MITM attack to grab username and password from ssl
traffic using SslStrip.
11 Source code review of web application.
12 Demonstrate Dos and DDos attack.
13 Use OSINT framework for deep analysis of target.
14 Make a case study on threat molding.
15 Analyze and prepare penetration testing report of web application.