Ethical Hacking

Workshop Cost: Rs.1100


Contact Details

9666875950
Kranthi
Register Now

Minimum Members: 1   Maximum Members: 1


EISystems™ is an Indian entity, which is exploring indefinitely in the innovative world of technology services and as a technology education provider.It was conceptualized with a motive to spread the magic of technology among this society of living beings who are now somewhere seeing their dependence on technology. We have a prominent base in various diversified service based sectors, which include Robotics, Forensics Sciences, Internet Consulting, Industrial Automation, Information Security and lot of innovative fields through our various business verticals.

The primary reason behind conducting the workshop is to give a live demonstration of different Cyber Attacks,Hands on Practice on Web Application Assessment and Penetration Testing,Cyber Crime Investigations and explain how security analysts and cyber crime investigators use techniques to solve these vulnerabilities and organized crimes.

ELIGIBLITY:

  • This is a basic level workshop and has no pre-requisite.
  • Anybody is eligible to join this workshop. 
  • The course and curriculum of this workshop is more inclined towards information security.

ESSENTIALS:

  • Participants are expected to bring their laptop (Windows Platform)  

                                     Its a two day workshop on 1st & 2nd of November from 9:30 am to 5pm.

SESSION 1 :

  • Ethics & Hacking - Hacking history : How it all begin 

                    Why is security needed? 

                    What is ethical hacking?  

                    Ethical Hacker Vs Malicious hacker  

                    Types of Hackers

                    Building an approach for ethical hacking

                    Steps in Ethical hacking

  • Basics of Internet,

                    Networking & Hacking  

                    What is a Network? 

                    Types of network – LANs, WANs & WLANs 

                    What is Internet?  

                    What is a Server? 

                    What is an IP Address? 

                    What is a domain name?  

                    IP-Domain Relation 

                    Client-Server Relationship Model  

                    Internet networking - What is a port? 

  • Information gathering & Google Hacking (Practical) 

                    Whois access (Demo)

                    Ip scaning (Demo) 

                    Port scaning (Demo) and Network scaning & its tools (Demo) 

                    What is Google and how does it work? and Google tricks (Demo)  

                    Basic hacks (Demo) - How can Google hacking help an Ethical Hacker? (Demo) 

                    Accesing online remote cameras

SESSION 2 :

  • Windows security (Practical) 

                    Windows security (Demo) 

                    Registry (Demo) 

                    Port & Services (Demo)

  • SQL injections attacks (Practical) 

                    Introduction of SQL  

                    What is SQL injection  

                    Checking SQL injection vulnerability (demo)  

                    Basic strategy of SQL injection (Demo) 

                    Getting login credientials using SQL injections (Live Demo)  

                    Using SQL to login via middleware language (Demo) 

                    URL and Forms (Demo) 

                    SQL Query SELECT, DROP etc. (Demo)  

                    SQL cheat sheets (Demo) 

                    Using source changes to bypass client side validation (Demo)  

                    Live demonstration of the attack (Demo)  

                    Using SQL injection tools (Demo) 

                    Importance of server side validation (Demo)  

                    How to protect your system from SQL Injections (Demo)

  • Phishing, Trojan & Viruses 

                    What is phishing?

                    Social engineering used in phishing (Demo) 

                    Phishing attack (Demo)  

                    Phishing sites (Demo)

                    Protection against phishing (Demo) 

                    Viruses: Trojans, Worms, Malware, Spyware  

                    Modes of spreading 

                    Different Ways a Trojan can Get into a System (Demo)  

                    Creation of Trojan using cybergate (Demo) 

                    Attacking a system using our created trojan (Demo) 

                    Indications of a Trojan Attack (Demo) 

                    Some Famous Trojans and Ports They Use (Demo) 

                    How to Detect Trojans? (Demo) 

                    How to Determine which Ports are Listening (Demo) 

                    Netstat

SESSION 3 :

  • Session hijacking & Cookie grabbing 

                    What are cookies? (Demo) 

                    Reading and writing cookies (Demo)

                    Passive Vs Active session hijack (demo)

                    TCP sessions and HTTP sessions (Demo)  

                    TCP session hijacking: Telnet (Demo) 

                    Stealing Cookies to hijack session using: XSS (Demo) 

                    Sniffers (Demo) 

                    Spoofing (Demo) 

                    Spoofing Vs Hijacking 

                    Types of Hijacking 

                    Protection against session Hijacking (Demo)

  • Social Network Attacks (Facebook, WhatsApp & Gmail) 

                    Overview of Social Engineering 

                    Case Study - Example of Social Engineering Attack 

                    Java Applet Attack (Demo) 

                    WhatsApp Security 

                    Facebook Security 

                    Gmail Security

  • Call & SMS Spoofing -

                    What is Fake SMS & Call? 

                    Method of generating fake SMS & Calls (Demo) 

                    Actions to be taken for fake SMS and Calls (Demo) Indian IT Act & Cybercrime 

                    IT ACT 2000 

                    Cyber crime/terrorism and its type 

                    Sections in the Indian constitution Sec. 65, 66 A,B,C, D , 67, 69 etc. 

                     Penalty in all sections of Indian constitution

SESSION 4 :

  • DNS Spoofing: -

                What is DNS Spoofing?  

                How does it work? 

                How to secure yourself?  

                DNS Spoofing (Demo)

  • Email Forging & Tracing 

                How does an email work? 

                Tracing an email (Demo) - Spam

  • Firewalls & Keyloggers (Demo)

                 Detecting fake emails (Demo) 

                 What is a firewall? & How can it help you 

                How a firewall works 

                What are key loggers? (Demo) 

                Types of key loggers? (Demo)

  •  All participants will get Paticipation Certificates from EI Systems.
  •  Email support for each and every participants if  they want to learn more or have any doubts regarding workshop ,while         practicing at home.

Venue Name : NIT Warangal

ABOUT THE COMPANY

EISystems™ is an Indian entity, which is exploring indefinitely in the innovative world of technology services and as a technology education provider.It was conceptualized with a motive to spread the magic of technology among this society of living beings who are now somewhere seeing their dependence on technology. We have a prominent base in various diversified service based sectors, which include Robotics, Forensics Sciences, Internet Consulting, Industrial Automation, Information Security and lot of innovative fields through our various business verticals.

ABOUT THE WORKSHOPS

The primary reason behind conducting the workshop is to give a live demonstration of different Cyber Attacks,Hands on Practice on Web Application Assessment and Penetration Testing,Cyber Crime Investigations and explain how security analysts and cyber crime investigators use techniques to solve these vulnerabilities and organized crimes.

ELIGIBLITY:

  • This is a basic level workshop and has no pre-requisite.
  • Anybody is eligible to join this workshop. 
  • The course and curriculum of this workshop is more inclined towards information security.

ESSENTIALS:

  • Participants are expected to bring their laptop (Windows Platform)  

                                     Its a two day workshop on 1st & 2nd of November from 9:30 am to 5pm.

CONTENT

SESSION 1 :

  • Ethics & Hacking - Hacking history : How it all begin 

                    Why is security needed? 

                    What is ethical hacking?  

                    Ethical Hacker Vs Malicious hacker  

                    Types of Hackers

                    Building an approach for ethical hacking

                    Steps in Ethical hacking

  • Basics of Internet,

                    Networking & Hacking  

                    What is a Network? 

                    Types of network – LANs, WANs & WLANs 

                    What is Internet?  

                    What is a Server? 

                    What is an IP Address? 

                    What is a domain name?  

                    IP-Domain Relation 

                    Client-Server Relationship Model  

                    Internet networking - What is a port? 

  • Information gathering & Google Hacking (Practical) 

                    Whois access (Demo)

                    Ip scaning (Demo) 

                    Port scaning (Demo) and Network scaning & its tools (Demo) 

                    What is Google and how does it work? and Google tricks (Demo)  

                    Basic hacks (Demo) - How can Google hacking help an Ethical Hacker? (Demo) 

                    Accesing online remote cameras

SESSION 2 :

  • Windows security (Practical) 

                    Windows security (Demo) 

                    Registry (Demo) 

                    Port & Services (Demo)

  • SQL injections attacks (Practical) 

                    Introduction of SQL  

                    What is SQL injection  

                    Checking SQL injection vulnerability (demo)  

                    Basic strategy of SQL injection (Demo) 

                    Getting login credientials using SQL injections (Live Demo)  

                    Using SQL to login via middleware language (Demo) 

                    URL and Forms (Demo) 

                    SQL Query SELECT, DROP etc. (Demo)  

                    SQL cheat sheets (Demo) 

                    Using source changes to bypass client side validation (Demo)  

                    Live demonstration of the attack (Demo)  

                    Using SQL injection tools (Demo) 

                    Importance of server side validation (Demo)  

                    How to protect your system from SQL Injections (Demo)

  • Phishing, Trojan & Viruses 

                    What is phishing?

                    Social engineering used in phishing (Demo) 

                    Phishing attack (Demo)  

                    Phishing sites (Demo)

                    Protection against phishing (Demo) 

                    Viruses: Trojans, Worms, Malware, Spyware  

                    Modes of spreading 

                    Different Ways a Trojan can Get into a System (Demo)  

                    Creation of Trojan using cybergate (Demo) 

                    Attacking a system using our created trojan (Demo) 

                    Indications of a Trojan Attack (Demo) 

                    Some Famous Trojans and Ports They Use (Demo) 

                    How to Detect Trojans? (Demo) 

                    How to Determine which Ports are Listening (Demo) 

                    Netstat

SESSION 3 :

  • Session hijacking & Cookie grabbing 

                    What are cookies? (Demo) 

                    Reading and writing cookies (Demo)

                    Passive Vs Active session hijack (demo)

                    TCP sessions and HTTP sessions (Demo)  

                    TCP session hijacking: Telnet (Demo) 

                    Stealing Cookies to hijack session using: XSS (Demo) 

                    Sniffers (Demo) 

                    Spoofing (Demo) 

                    Spoofing Vs Hijacking 

                    Types of Hijacking 

                    Protection against session Hijacking (Demo)

  • Social Network Attacks (Facebook, WhatsApp & Gmail) 

                    Overview of Social Engineering 

                    Case Study - Example of Social Engineering Attack 

                    Java Applet Attack (Demo) 

                    WhatsApp Security 

                    Facebook Security 

                    Gmail Security

  • Call & SMS Spoofing -

                    What is Fake SMS & Call? 

                    Method of generating fake SMS & Calls (Demo) 

                    Actions to be taken for fake SMS and Calls (Demo) Indian IT Act & Cybercrime 

                    IT ACT 2000 

                    Cyber crime/terrorism and its type 

                    Sections in the Indian constitution Sec. 65, 66 A,B,C, D , 67, 69 etc. 

                     Penalty in all sections of Indian constitution

SESSION 4 :

  • DNS Spoofing: -

                What is DNS Spoofing?  

                How does it work? 

                How to secure yourself?  

                DNS Spoofing (Demo)

  • Email Forging & Tracing 

                How does an email work? 

                Tracing an email (Demo) - Spam

  • Firewalls & Keyloggers (Demo)

                 Detecting fake emails (Demo) 

                 What is a firewall? & How can it help you 

                How a firewall works 

                What are key loggers? (Demo) 

                Types of key loggers? (Demo)

BENEFITS

  •  All participants will get Paticipation Certificates from EI Systems.
  •  Email support for each and every participants if  they want to learn more or have any doubts regarding workshop ,while         practicing at home.

VENUE AND MAP

Venue Name : NIT Warangal