Ethical Hacking Boot Camp - Learn, Hack and Win!!!

Ethical Hacking Boot Camp - Learn, Hack and Win!!!

 

  • Early Bird Offer

    Sale Date Ended

    INR 10200
    Sold Out
  • Regular Course Fee

    Sale Date Ended

    INR 12000
    Sold Out

Invite friends

Contact Us

Page Views : 2924

About The Event

 

Come and Learn the Art of Hacking Ethically, learn the latest computer security tools, techniques & methods related to Ethical Hacking  from basics to expert level.

Syllabus :  PenTest with Linux & Complete Wi-Fi PenTest

Course Duration :  30 Days

Start Date :  15th December 2012

Course Fee :  12000/-

Prize :  25,000/- Cash Prize

Timing : Flexible Batches, 10:00AM to 12:00PM or 4:00PM to 6PM

Weekend Batches for Working Professionals: 4 Weekends (Sat & Sun)

Course Content : http://kivacybersecurities.com/images/bootcamp-syllabus.pdf

 

PENTEST WITH LINUX

MODULE 1:

  • Introduction to Linux
  • Bash shell Scripting
  • Linux Networking Service management in Linux
  • Linux House keeping
  • Customizing available security distros(Backtrack, Samurai)

 

Challenge 1: Student must automate Linux server with Bash scripts to perform certain activities according to client requirement.

 

MODULE  2:

  • Protocols:  TCP,  UDP, HTTP, HTTPS, FTP, ARP, SSH.
  • Packet Analysis with Wireshark
  • Swiss Knife Netcat
  • Difference between Analysis of Network & Web

 

Challenge 2: Student should analyze the given Packet Dump and submit detailed analysis report.

 

MODULE  3:

  • PenTest Methodologies
  • Information Gathering
  • Role of Search Engines and Social Networking sites.
  • NETCRAFT, WHOIS, MALTEGO, SHODAN Does VISHING works?
  • How to hack vulnerable Human OS?

 

Challenge 3: Student should gather all possible information of provided domain.

 

MODULE  4:

  • Reconnaissance
  • Enumeration: DNS, Windows Net
  • BIOS,  Linux Sharing, SNMP, SMTP.
  • Port Scanning Methodologies
  • Tools: Nmap, Unicorn
  • Hybrid Enumeration Techniques 

 

Challenge 4: Performing Enumeration on highly secured live servers.

 

MODULE 5: 

  • Introduction to Metasploit
  • Exploitation with Metasploit
  • Backdooring
  • POST-Exploitation
  • Meterpreter
  • Writing Meterpreter Scripts
  • Pivoting
  • Armitage - Fast and Easy Hacking

 

Challenge 5: Capture The Flag Student should pawn 5 live stations 

 

MODULE 6:

  • Hackers Assembly Language
  • Python to make things fast and accurate
  • Coding fuzzers
  • Setting up environment for Buffer overflows attack
  • Fishing for bugs
  • Fuzzers to crash
  • Locating space for shell
  • Finding return address
  • Basic Shell codingUse of Metasploit in Exploitation
  • Making things clean to get shell
  • How to Parse and integrate available exploits

 

Challenge 6: Student should exploit provided vulnerable softwares. 

 

MODULE 7:

  • Sniffers
  • ARP Spoofing
  • DNS Spoofing
  • Making Network dumb
  • Dos attack in network
  • Ettercap
  • Integrating Ettercap with other tools
  • Bypassing HTTPS
  • HTTP Tunneling
  • SSH Tunneling
  • Port Forwarding
  • Network Pivoting

 

Challenge 7: Student should enter into network by pawning one system and should identify sniffing system in network.

 

MODULE 8:

  • Client Side Attacks
  • BEEF
  • Social Engineering Toolkit
  • Encryption and Decryption
  • Password Cracking -- Hydra JTR(john the ripper)
  • CUDA in cracking local passwords 
  • Python to craft multithreaded password cracker using CUDA cores

 

Challenge 8: Student should complete programming python password cracker according to given guide lines

 

MODULE 9:

  • Web Attacks
  • Web Application pen test guidelines
  • OWASP TOP 10
  • Crawling Web Application
  • Fuzzing with Web proxies (Burp suite)
  • Tools for Web App PenTest -- ACUNETIX, SQLMAP, XSSER, NIKTO, BURP SUITE, W3AF, WEB INSPECT, PYTHON to craft own tools
  • SQL Injection
  • XSS
  • RFI/LFI
  • File Upload bugs
  • PenTest Reporting

 

Challenge 9:9-1: Cracking vulnerable web server.9-2: Should Harden vulnerable web server to make it hack proof.

 

MODULE 10:

  • Physical Attacks
  • Data Recovery
  • Data Encryption
  • Automated Python scripts for server house keeping
  • Snort Firewall Writing Firewall Rules
  • Auditing Firewall Logs
  • Incident Handling

Challenge 10: Student should defend the server using knowledge gained during course while others attack.

PLUS

Complete Wi-Fi PenTest.

Venue Map