Temple University

Schedule

Session Topics Reading Due
1
Overview of Course, Philosophy of Ethical Hacking and Penetration Testing, and the hacking process.
2

Cyber Crime Laws and TCP/IP and Network Architecture and its impact on the process of hacking.

3

Google Hacking, Reconnaissance – Concepts of reconnaissance used to obtain basic, high level information about a target organization, often considered information leakage, including but not limited to technical and non-technical public contacts, IP address ranges, document formats, and supported systems.

4

Vulnerability scanning and analysis of results, Assignment presentation

  • (student presentations) Reconnaissance exercise using only publicly available information, develop a profile of a public company or organization of your choosing.
Assignment 1
5

System and User enumeration, Assignment presentation

  • (student presentations) Scanning exercise targeted against only systems you personally own, develop a profile of the targeted machine or machines.
Assignment 2
6

Sniffers

7

Test 1, NetCat

8

Social Engineering, Encoding, and Encryption

9

Malware including Trojans, Backdoors, Zero-days, Virus, Worms, and Polymorphic malware


10

Web application hacking, Intercepting Proxies, and URL Editing

  • (student presentations) Intercepting Proxy exercise targeted against a public website of your choice. Only normal website activity is to be profiled. Under no circumstances shall injection techniques be used.
11

SQL injection, Assignment presentation

Assignment 3
12

Web Services

13 Evasion Techniques

14

Test 2