415 Labs

CSCI 415 Labs

Most labs are mapped to objectives of the Certified Ethical Hacking (CEH) qualifications. A couple are mapped to CompT IA.

The mapping to CEH objectives means that the student will be familiar with the same tools and techniques that malicious black hat hackers use to conduct catastrophic cyberattacks.

Examples of security jobs that require or prefer CEH certification:  https://www.indeed.com/q-Ceh-jobs.html


Module Lab Certified Ethical Hacking (CEH) domain
1 Using Social Engineering (SET)


Scanning the Network on the LAN

Social Engineering



2 Using Public Key Encryption to Secure Messages


Symmetric key program


3 Remote and Local Exploitation


Hash Digest program

System Hacking
4 Exploiting a Vulnerable Web Application


Attacking Webservers from the WAN

Hacking Web Applications


Hacking Web Server

5 Performing a Denial of Service Attack from the WAN


Performing SQL Injection to Manipulate Tables in a DB




SQL Injection

6 Attacking the Firewall and Stealing Data over and Encrypted Channel


Securing the pfSense Firewall

Evading IDS, Firewalls, and Honeypots


CompTIA: Network Security

7 Digital Forensics: To Catch a Fake (Exercise)


Steganography (exercise with external program)

CompTIA: Network Security

(Computing Technology Industry Association)

8 Capturing and Analyzing Network Traffic Using a Sniffer Sniffing
9 Using Browser Exploitation to Take Over a Host’s Computer Session Hijacking
10 WEP & WPA & Decrypting the Traffic Hacking Wireless Networks

Comments are closed.