Ethical Hacking | Malicious

Ethical Hacking has always been a subject of interest and passion with great career opportunities for computer crazy people. It makes one aware of the current shortcomings which gives rise to bad security systems and finds out a way which constitutes an ‘ideal secure system’. The focus of the workshop is to teach our students how to protect yourself from the menace of hacking and build future systems. With this niche technology one can coordinate various different internet service providers and exploit their weakness to meet your own ends.

Prerequisites:-

Can access computer system and make use of internet to perform search over Google.

Need to Prepare?

Prior programming experience is not required.

Tools Expected:-

Windows OS based PC, Internet Connection, Notebook and Pen

Tools Provided (for the session):-

Software, Hacking tools and Reference Materials.

Concepts:-

Operating System, Logic creation, Short Keys, Programming, Keywords etc.

Summary:-

This workshop will be addressed about how to protect yourself from the menace of hacking and build future systems. It ended up with, making you aware of the current shortcomings which gives rise to bad security systems.

Project:-

E-Mail attacks, Windows OS attacks, Target web server, Mobile Hacking

Commitment:-

2 Days (7 hours each)

Agenda:-

Day 1
Session 1-  (03:30 hrs)
Introduction to Ethics and Hacking
  • Hacking History- How It All Began
  • Need For Ethical Hacking
  • Why We Require Ethical Hackers
  • Types Of Hackers
  • Steps In Ethical Hacking
  • Scopes In Hacking
Windows OS Hacking
  • To exploit the vulnerabilities of windows using live devices and Universal Serial Bus (USB).
Steganography
  • What is Steganography?
  • Hiding data behind Images, PDFs, Audio and Videos files

 

Session 2- (02:30 hrs)
Basics Of Internet, Networking And Hacking
  • What is a Network?
  • Types of network – LANs, WANs & WLANs
  • What is Internet?
  • Basic Structure
  • Web Server As a Target
  • What is a Server?
  • What is an IP Address?
  • What is a domain name?
  • IP-Domain Relation
  • Client-Server Relationship Model
  • Internet networking
  • Basic explanation of exploitation of loopholes

 

Session Recap
Day 2
Session 1- (03:30 hrs)
Following Hacker’s Mindset
  • Virtualization
  • Trojans & Viruses
  • What is phishing?
  • Preparation for phishing
  • Mobile and VOIP Hacking
  • Live demonstration of the attack (Demo)
  • Using SQL injection tools (Demo)
  • How to protect your system from attacks
  • Cyber Laws

 

Session 2- (02:30 hrs)
Attacks on E-mail
  • What is Email Forging?
  • How to generate a Fake Mail?
  • How to detect a fake Email?
  • Introduction to cyber laws
  • IT Acts, Rules and Regulation
Session Recap

Zonal Round of SkillThon

  • Competition
  • Certificate distribution and acknowledgement

Download Complete Workshop Structure of Ethical Hacking | Malicious