Book Online Tickets for Ethical Hacking Boot Camp - Learn, Hack , Hyderabad.  
Come and Learn the Art of Hacking Ethically, learn the latest computer security tools, techniques & methods related to Ethical Hacking  from basics to expert level.
Syllabus :  PenTest with Linux & Complete Wi-Fi PenTe

Ethical Hacking Boot Camp - Learn, Hack and Win!!!


  • Early Bird Offer

    Sale Date Ended

    INR 10200
    Sold Out
  • Regular Course Fee

    Sale Date Ended

    INR 12000
    Sold Out

Invite friends

Contact Us

Page Views : 2926

About The Event


Come and Learn the Art of Hacking Ethically, learn the latest computer security tools, techniques & methods related to Ethical Hacking  from basics to expert level.

Syllabus :  PenTest with Linux & Complete Wi-Fi PenTest

Course Duration :  30 Days

Start Date :  15th December 2012

Course Fee :  12000/-

Prize :  25,000/- Cash Prize

Timing : Flexible Batches, 10:00AM to 12:00PM or 4:00PM to 6PM

Weekend Batches for Working Professionals: 4 Weekends (Sat & Sun)

Course Content :




  • Introduction to Linux
  • Bash shell Scripting
  • Linux Networking Service management in Linux
  • Linux House keeping
  • Customizing available security distros(Backtrack, Samurai)


Challenge 1: Student must automate Linux server with Bash scripts to perform certain activities according to client requirement.



  • Protocols:  TCP,  UDP, HTTP, HTTPS, FTP, ARP, SSH.
  • Packet Analysis with Wireshark
  • Swiss Knife Netcat
  • Difference between Analysis of Network & Web


Challenge 2: Student should analyze the given Packet Dump and submit detailed analysis report.



  • PenTest Methodologies
  • Information Gathering
  • Role of Search Engines and Social Networking sites.
  • How to hack vulnerable Human OS?


Challenge 3: Student should gather all possible information of provided domain.



  • Reconnaissance
  • Enumeration: DNS, Windows Net
  • BIOS,  Linux Sharing, SNMP, SMTP.
  • Port Scanning Methodologies
  • Tools: Nmap, Unicorn
  • Hybrid Enumeration Techniques 


Challenge 4: Performing Enumeration on highly secured live servers.



  • Introduction to Metasploit
  • Exploitation with Metasploit
  • Backdooring
  • POST-Exploitation
  • Meterpreter
  • Writing Meterpreter Scripts
  • Pivoting
  • Armitage - Fast and Easy Hacking


Challenge 5: Capture The Flag Student should pawn 5 live stations 



  • Hackers Assembly Language
  • Python to make things fast and accurate
  • Coding fuzzers
  • Setting up environment for Buffer overflows attack
  • Fishing for bugs
  • Fuzzers to crash
  • Locating space for shell
  • Finding return address
  • Basic Shell codingUse of Metasploit in Exploitation
  • Making things clean to get shell
  • How to Parse and integrate available exploits


Challenge 6: Student should exploit provided vulnerable softwares. 



  • Sniffers
  • ARP Spoofing
  • DNS Spoofing
  • Making Network dumb
  • Dos attack in network
  • Ettercap
  • Integrating Ettercap with other tools
  • Bypassing HTTPS
  • HTTP Tunneling
  • SSH Tunneling
  • Port Forwarding
  • Network Pivoting


Challenge 7: Student should enter into network by pawning one system and should identify sniffing system in network.



  • Client Side Attacks
  • BEEF
  • Social Engineering Toolkit
  • Encryption and Decryption
  • Password Cracking -- Hydra JTR(john the ripper)
  • CUDA in cracking local passwords 
  • Python to craft multithreaded password cracker using CUDA cores


Challenge 8: Student should complete programming python password cracker according to given guide lines



  • Web Attacks
  • Web Application pen test guidelines
  • OWASP TOP 10
  • Crawling Web Application
  • Fuzzing with Web proxies (Burp suite)
  • Tools for Web App PenTest -- ACUNETIX, SQLMAP, XSSER, NIKTO, BURP SUITE, W3AF, WEB INSPECT, PYTHON to craft own tools
  • SQL Injection
  • XSS
  • File Upload bugs
  • PenTest Reporting


Challenge 9:9-1: Cracking vulnerable web server.9-2: Should Harden vulnerable web server to make it hack proof.



  • Physical Attacks
  • Data Recovery
  • Data Encryption
  • Automated Python scripts for server house keeping
  • Snort Firewall Writing Firewall Rules
  • Auditing Firewall Logs
  • Incident Handling

Challenge 10: Student should defend the server using knowledge gained during course while others attack.


Complete Wi-Fi PenTest.

Venue Map