Workshop on Ethical Hacking - 2 Days

Workshop on Ethical Hacking - 2 Days


  • Entry pass

    entry for one person

    Sale Date Ended

    INR 200
    Sold Out

Invite friends

Contact Us

Page Views : 545

About The Event

Ethical Hacking

Contact: 8341426712


The focus of these workshops is to teach you how to protect yourself from the menace of hacking. During the workshop, the primary aim is to introduce you to the current popular attacks ie Website Hacking, wifi hacking, System Hacking, Web Cam Hacking and explain the techniques to counter them with penetration testing, It will cover concepts and working of the attacks inside as well as outside the network, Students will Develop their own tools and script. We will be giving an overview of what constitutes an 'ideal secure system'. This course would equip students to counter the potential attacks. Also, the aim would be to impart technical knowledge how to make the Internet transactions safe and secure. Here is the detailed content which we are going to cover in the workshop.


About the workshop :

This workshop is organized at CMR Technical Campus and speaker is MR.Baba Shasheer who was a senior cyber security expert and solved many cyber cases.

Workshop Modules



  • What is Information Security?
  • Problems faced by the Corporate World
  • Why Corporate needs Information Security?
  • Who is a Hacker?
  • Type of Ethical Hackers
  • Hackers vs. Crackers
  • Classification of Hackers
  • Phases of Hacking
  • Basic Terminologies
  • Hacker Classes
  • Skills of Ethical Hacker
  • Vulnerability Research



  • IP Address
  • Finding a Remote IP Address
  • Hiding Your IP Address
  • Tracing an IP Address
  • MAC Address
  • Internal VS External IP Addresses
  • MAC Addresses
  • MAC Addresses Spoofing
  • Proxy Servers 
  • Unblocking Websites
  • Proxy Bouncing 
  • Onion Routing KALI



  • Introduction
  • Installation
  • Basic Linux Command
  • Installing Linux Application
  • Assigning IP Address in Kali
  • Changing the default password
  • Updating the applications and operating system
  • Virtual Box
  • VMware Workstation



  • GHDB
  • Advisories and server vulnerabilities
  • Finding Login Page
  • Directory Listing and Locating Directory Listings along with specific folders
  • Use of Advance Search Operator
  • Using Cache and Google as Proxy
  • Hacking Live Webcam, Printer etc
  • Searching for Vulnerable machines through Google
  • Email harvesting
  • Accessing Parent Directories


  • What is Footprinting
  • Types of Footprinting
  • DNS brute forcing with fierce
  • Domain Information Groper
  • NsLookup — it's there when you need it
  • Search for People
  • Search for Company’s Information
  • Finding Internal URL of Website
  • Gather public information
  • DNS and WHOIS Lookups
  • Robots.txt
  • Network Reconnaissance
  • Archive Pages
  • Mirroring of Websites


  • Definition of Scanning
  • Types of Scanning
  • Difference between Port and Network Scanning
  • Ping and Ping Sweep
  • Packet Crafting using HPING3
  • Network Scanning
  • Use of NMAP
  • Advanced Port Scanner
  • Port Scanning
  • OS Fingerprinting
  • IDServer Tool
  • Vulnerability Scanning
  • Nessus Tool
  • Daemon Banner Grabbing



  • Exploit Vulnerability
  • Mestaploit -learn it and love it
  • Armitage
  • Learn Meterpreter
  • Getting files to and from victim machines



  • System Hacking Techniques
  • System Hacking Goal
  • Window Hacking
  • Window Security
  • Password Cracking
  • SysKey
  • Hiding Files
  • Ophcrack
  • Hiren Boot & Konboot
  • Concept of Auditing, Logs, Covering Tracks
  • What are Covering Tracks?
  • Techniques to clear Tracks
  • Covering Track Tools 



  • Network Sniffing
  • Active and passive sniffing attacks
  • Session Hijacking Attacks
  • Tools : Hamster, Ferret, Urlsnarf
  • DNS Poisoning
  • Passive Sniffing
  • Active Sniffing
  • ARP Poisoning Attacks
  • Ettercap , Cain abel & Tcpdump
  • MAC Flooding Attacks
  • Tool:MACOF
  • Man in Middle Sniffing Attacks
  • DOS Attacks using ARP Tables



  • Purpose of Trojan
  • Types of Trojan
  • Purpose of Trojan inventor
  • Detecting Trojan Attacks
  • Ports used by Trojans
  • Beast & Dark Comet
  • Wrapper
  • Icon Changer
  • Network Activity Detection
  • Process Monitoring Tools



  • Working of Virus
  • Working of Worm
  • Stages of Virus
  • Creating Virus by programming and automate tools
  • Virus Analysis
  • Difference between Worm & Virus
  • Virus Detection Method
  • Spyware
  • Internet and E-mail Spyware
  • Adware



  • Introduction of Wireless Network
  • Types of Wireless Network
  • Wireless Technology
  • Advantages and Disadvantages of Wireless Network
  • Wireless Cracking WEP,WPA,WPA2
  • Wireless Security
  • Wireless Intrusion Detection System
  • Tips to Secure Wireless Network



  • Concept of Email
  • Spam and Spam Laws
  • E-Mail Tracking By Header
  • Concept of Fake E-mails
  • Various Steps to send Fake mails
  • Trace IP by PHP Script
  • Phishing
  • Tabnapping
  • Desktop Phishing
  • Social Engineering
  • Doxing



  • What is Keylogger
  • Categorization of Keystroke Loggers
  • Advanced Keylogger
  • Keylogger: Spytech SpyAgent
  • Keylogger: Perfect Keylogger
  • Hardware Keylogger



  • USB
  • Hacking USB for Coping Data
  • Blocking USB Devices
  • Browser Security
  • Manta Browser



  • Art of Hiding
  • How Steganography Works
  • Steganography Today
  • Steganography With CMD
  • Steganography Tools
  • Steganalysis



  • Introduction to Cryptography
  • Advantages and uses of Cryptography
  • Symmetric Algorithms Asymmetric Algorithms
  • Encryption
  • Cipher
  • Disk Encryption
  • Hashing Algorithms



  • Concept: Denial of Service
  • Introduction to Distributed Denial of Service Attacks?
  • Working of Distributed Denial of Service Attacks?
  • Symptoms of a DOS Attack
  • Impact DDOS/DOS Attack
  • Difference of DDOS & DOS
  • Intoduction to Botnet


Social Engineering attacks Through SET

  • Set Social Engineering toolkit



  • Vulnerability Scanning
  • Acunetix &W3af
  • Nikto
  • WAF Testing
  • WAF Firewall
  • WafW00f


SQL Injection Concepts

  • Basics of SQL
  • Web Application Working
  • Introduction to Server Side Technologies
  • SQL injection
  • Identifying SQL Injection via Error Messages
  • SQL Injection using Kali SQLMAP


Cross Site Scripting

  • Introduction Cross Site Scripting
  • Ways of Launching Cross-Site Scripting Attacks
  • Working Process of Cross-Site Scripting Attacks
  • When will be an attack successful?
  • Types of XSS Attacks
  • Cross-Site Scripting



  • What is Social Engineering?
  • Techniques of Social Engineering
  • Attempt Using Phone, E-mail, Traditional Mail, In person, Dumpster Diving, Websites, Shoulder surfing


Firewalls & Honeypots

  • What Does a Firewall Do?
  • What a Firewall cannot do
  • How does a Firewall work?
  • Types of Firewall
  • Working of Firewall
  • Advantages and Disadvantages of Firewall
  • Test firewall using firewalking tool
  • Concept of Honeypots
  • Purpose and working of Honeypots
  • Advantages and Disadvantages of Honeypots
  • Types of Honeypots



  • Pen Testing Concepts
  • Types of Pen Testing
  • Pen Testing Phases
  • Pen Testing Tools


Tools to be used-

  • Kali Linux
  • VM Ware
  • MetaSploit
  • NMap
  • Hping3
  • SqlMap.

and manymore............