Workshop on Ethical Hacking - 2 Days

Workshop on Ethical Hacking - 2 Days

 

  • Entry pass

    entry for one person

    Sale Date Ended

    INR 200
    Sold Out

Invite friends

Contact Us

Page Views : 521

About The Event

Ethical Hacking

Contact: 8341426712

 

The focus of these workshops is to teach you how to protect yourself from the menace of hacking. During the workshop, the primary aim is to introduce you to the current popular attacks ie Website Hacking, wifi hacking, System Hacking, Web Cam Hacking and explain the techniques to counter them with penetration testing, It will cover concepts and working of the attacks inside as well as outside the network, Students will Develop their own tools and script. We will be giving an overview of what constitutes an 'ideal secure system'. This course would equip students to counter the potential attacks. Also, the aim would be to impart technical knowledge how to make the Internet transactions safe and secure. Here is the detailed content which we are going to cover in the workshop.

 

About the workshop :

This workshop is organized at CMR Technical Campus and speaker is MR.Baba Shasheer who was a senior cyber security expert and solved many cyber cases.

Workshop Modules

 

INTRODUCTION TO ETHICAL HACKING

  • What is Information Security?
  • Problems faced by the Corporate World
  • Why Corporate needs Information Security?
  • Who is a Hacker?
  • Type of Ethical Hackers
  • Hackers vs. Crackers
  • Classification of Hackers
  • Phases of Hacking
  • Basic Terminologies
  • Hacker Classes
  • Skills of Ethical Hacker
  • Vulnerability Research

 

NETWORKING

  • IP Address
  • Finding a Remote IP Address
  • Hiding Your IP Address
  • Tracing an IP Address
  • MAC Address
  • Internal VS External IP Addresses
  • MAC Addresses
  • MAC Addresses Spoofing
  • MACCHANGER 
  • Proxy Servers 
  • Unblocking Websites
  • Proxy Bouncing 
  • Onion Routing KALI

 

KALI LINUX

  • Introduction
  • Installation
  • Basic Linux Command
  • Installing Linux Application
  • Assigning IP Address in Kali
  • Changing the default password
  • Updating the applications and operating system
  • Virtual Box
  • VMware Workstation

 

GOOGLE HACKING

  • GHDB
  • Advisories and server vulnerabilities
  • Finding Login Page
  • Directory Listing and Locating Directory Listings along with specific folders
  • Use of Advance Search Operator
  • Using Cache and Google as Proxy
  • Hacking Live Webcam, Printer etc
  • Searching for Vulnerable machines through Google
  • Email harvesting
  • Accessing Parent Directories

FOOTPRINTING

  • What is Footprinting
  • Types of Footprinting
  • DNS brute forcing with fierce
  • Domain Information Groper
  • NsLookup — it's there when you need it
  • Search for People
  • Search for Company’s Information
  • Finding Internal URL of Website
  • Gather public information
  • DNS and WHOIS Lookups
  • Robots.txt
  • Network Reconnaissance
  • Archive Pages
  • Mirroring of Websites

SCANNING

  • Definition of Scanning
  • Types of Scanning
  • Difference between Port and Network Scanning
  • Ping and Ping Sweep
  • Packet Crafting using HPING3
  • Network Scanning
  • Use of NMAP
  • Advanced Port Scanner
  • Port Scanning
  • OS Fingerprinting
  • IDServer Tool
  • Vulnerability Scanning
  • Nessus Tool
  • Daemon Banner Grabbing

 

ATTACKING PHASE

  • Exploit Vulnerability
  • Mestaploit -learn it and love it
  • Armitage
  • Learn Meterpreter
  • Getting files to and from victim machines

 

SYSTEM HACKING

  • System Hacking Techniques
  • System Hacking Goal
  • Window Hacking
  • Window Security
  • Password Cracking
  • SysKey
  • Hiding Files
  • Ophcrack
  • Hiren Boot & Konboot
  • Concept of Auditing, Logs, Covering Tracks
  • What are Covering Tracks?
  • Techniques to clear Tracks
  • Covering Track Tools 

 

SNIFFING

  • Network Sniffing
  • Active and passive sniffing attacks
  • Session Hijacking Attacks
  • Tools : Hamster, Ferret, Urlsnarf
  • DNS Poisoning
  • Passive Sniffing
  • Active Sniffing
  • ARP Poisoning Attacks
  • Ettercap , Cain abel & Tcpdump
  • MAC Flooding Attacks
  • Tool:MACOF
  • Man in Middle Sniffing Attacks
  • DOS Attacks using ARP Tables

 

TROJAN

  • Purpose of Trojan
  • Types of Trojan
  • Purpose of Trojan inventor
  • Detecting Trojan Attacks
  • Ports used by Trojans
  • Beast & Dark Comet
  • Wrapper
  • Icon Changer
  • Network Activity Detection
  • Process Monitoring Tools

 

VIRUS & WORM

  • Working of Virus
  • Working of Worm
  • Stages of Virus
  • Creating Virus by programming and automate tools
  • Virus Analysis
  • Difference between Worm & Virus
  • Virus Detection Method
  • Spyware
  • Internet and E-mail Spyware
  • Adware

 

WIRELESS HACKING

  • Introduction of Wireless Network
  • Types of Wireless Network
  • Wireless Technology
  • Advantages and Disadvantages of Wireless Network
  • Wireless Cracking WEP,WPA,WPA2
  • Wireless Security
  • Wireless Intrusion Detection System
  • Tips to Secure Wireless Network

 

EMAIL HACKING

  • Concept of Email
  • Spam and Spam Laws
  • E-Mail Tracking By Header
  • Concept of Fake E-mails
  • Various Steps to send Fake mails
  • Trace IP by PHP Script
  • Phishing
  • Tabnapping
  • Desktop Phishing
  • Social Engineering
  • Doxing

 

Keylogger

  • What is Keylogger
  • Categorization of Keystroke Loggers
  • Advanced Keylogger
  • Keylogger: Spytech SpyAgent
  • Keylogger: Perfect Keylogger
  • Hardware Keylogger

 

USB HACKING & BROWSER HACKING

  • USB
  • Hacking USB for Coping Data
  • Blocking USB Devices
  • Browser Security
  • Manta Browser

 

STEGANOGRAPHY

  • Art of Hiding
  • How Steganography Works
  • Steganography Today
  • Steganography With CMD
  • Steganography Tools
  • Steganalysis

 

CRYPTOGRAPHY

  • Introduction to Cryptography
  • Advantages and uses of Cryptography
  • Symmetric Algorithms Asymmetric Algorithms
  • Encryption
  • Cipher
  • Disk Encryption
  • Hashing Algorithms

 

DOS AND DDOS

  • Concept: Denial of Service
  • Introduction to Distributed Denial of Service Attacks?
  • Working of Distributed Denial of Service Attacks?
  • Symptoms of a DOS Attack
  • Impact DDOS/DOS Attack
  • Difference of DDOS & DOS
  • Intoduction to Botnet

 

Social Engineering attacks Through SET

  • Set Social Engineering toolkit

 

WEBSITE HACKING

  • Vulnerability Scanning
  • Acunetix &W3af
  • Nikto
  • WAF Testing
  • WAF Firewall
  • WafW00f

 

SQL Injection Concepts

  • Basics of SQL
  • Web Application Working
  • Introduction to Server Side Technologies
  • SQL injection
  • Identifying SQL Injection via Error Messages
  • SQL Injection using Kali SQLMAP
  • HAVIJ

 

Cross Site Scripting

  • Introduction Cross Site Scripting
  • Ways of Launching Cross-Site Scripting Attacks
  • Working Process of Cross-Site Scripting Attacks
  • When will be an attack successful?
  • Types of XSS Attacks
  • Cross-Site Scripting

 

SOCIAL ENGINEERING

  • What is Social Engineering?
  • Techniques of Social Engineering
  • Attempt Using Phone, E-mail, Traditional Mail, In person, Dumpster Diving, Websites, Shoulder surfing

 

Firewalls & Honeypots

  • What Does a Firewall Do?
  • What a Firewall cannot do
  • How does a Firewall work?
  • Types of Firewall
  • Working of Firewall
  • Advantages and Disadvantages of Firewall
  • Test firewall using firewalking tool
  • Concept of Honeypots
  • Purpose and working of Honeypots
  • Advantages and Disadvantages of Honeypots
  • Types of Honeypots

 

PENETRATION TESTING

  • Pen Testing Concepts
  • Types of Pen Testing
  • Pen Testing Phases
  • Pen Testing Tools

 

Tools to be used-

  • Kali Linux
  • VM Ware
  • WINDOWS XP/ WINDOWS 7
  • MetaSploit
  • NMap
  • Hping3
  • SqlMap.

and manymore............