Ethical Hacking & Cyber Security Workshop i3indya Technologies (A unit of ithree Infotech Pvt. Ltd.) Delhi Office: 37, First Floor, Defence Enclave, Preet Vihar, New Delhi-110092 Contact us: Email: info@i3indya.com Website: www.i3indya.com Office: 011 42815252, 45683426
HACK-O-MANIA A Workshop on Ethical Hacking & Cyber Security (16 Hours) The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. However, they have created significant and unprecedented risks to operations. Computer security has, in turn, become much more important as all levels of an organization to utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate of sensitive information. After the boom in Networking and Software jobs, the past two year have seen a sharp rise in the field of information security. Information Security and Ethical Hacking is the latest buzzword in the industry. In the past five years, the percentage of hacking crimes, data thefts, data losses, viruses and other cyber crimes have increased exponentially. A] Workshop Syllabus: Modules 1 Ethical Hacking & Cyber Security Particulars Ethical Hacking Introduction to Ethical Hacking Hackers & Hacking Methodologies Types Of Hacker Under Ground hacker Community Step Of Conducting Ethical Hacking Hiding Your Identity While Performing Attack Duration (hours) Information Gathering (Foot Printing) & Scanning Methodologies 2 Get Know How Hacker Gather Information about Victim on Internet Information Gathering of Websites & Networks Scanning Ports, Network, Vulnerability & Structure of Websites Finding Admin Panel of Websites 3 Google Hacking & Advanced Google Hacking Using Google as Hacking Tools Basic & Advanced Syntaxes of Google Finding Vulnerable Websites Using Google Web Cam Hacking Google Password Hacking Mails Password Hacking By Google Sensitive Files Hacking
4 5 6 Google Hacks Tool Google URL Hacking Passwords Steeling By Google Etc Directory Hacking Enumeration What Is Enumeration Use of Enumeration Enumerates Username And Password of Victim Cracking Password Techniques Escalate admin Level Power Plant Backdoors & Countermeasures System Hacking (Win, Vista & Win7) Bypass Login Password View System Account Reset Admin Password Reset Syskey Password Cracking Admin Password (Win, Vista & Win 7 etc) Make Backdoor for Future Use Convert Guest To Admin Open System Account Create User By bat Files Hidden User Edit System 32 Files & Many More Trojans and Backdoors & Viruses Types of Trojans Famous Trojans Different Way a Trojan Can get Into A system Trojans Port Uses Hack system By Trojans Hacking Passwords By Trojans Controlling System By Trojans Analysis of Trojans/Virus 7 Sniffer Hacking Technique Overview of Sniffer Hacks Password Or many More By sniffers Types of Sniffing: - Active /Passive HTTP Sniffing Techniques Password or Data Sniffing Techniques Countermeasures Against Sniffing
8 9 10 11 Proxy Server Technologies What is Proxy? Use of Proxy Hide Your Identity By Proxy Server Open Block Websites By Proxy Online Best proxy Set Proxy on Your browser Proxy Tools Tor MultiProxy Ultrasurf Anonymizer Etc Hacking Email Accounts & Email Security Understanding Email How it Works Tracing an E-Mails Fake Mailing Tricks Mail Bombing Hacking Email Account (See Password & Password View) Cracking E-Mails Account Password Methods Mails Forwards Tricks Securing Mails Security policy Or Activity of Email Spam Securing & Report Phishing Hacking Methods & Countermeasures Introduction Of Phishing How it Works Cases of Phishing Technique of Phishing How Hacker Hack Password By Phishing Gmail, Orkut, yahoo Phishing Technique How to protect Yourself From Phishing Countermeasures SQL Injection & Countermeasure What Is SQL Injection SQL Injection Techniques to gain access to a system Microsoft OLEDB Errors How Hacker Hack Website by SQL injection Query Use in SQL Injection SQL Injection Cases Prevention & Countermeasures
12 13 14 15 16 Data Hiding Techniques, Steganagraphy, Cryptography What Is Steganagraphy Use of Steganagraphy Secure Your data Hide Data behind the Image or Any files Hacking Web Servers Technology, Vulnerability Assessment, Penetration Testing What is Vulnerability? Method of finding Vulnerability Web Server Vulnerability Web Application Threats Exploit Against Webservers Hacking WebServer Techniques Cross scripting SQL Injection Penetration Testing Methodologies Countermeasures USB Hacking Techniques What is USB Hacking Hacking Password & Cookies Etc USB Thief Make Your Own USB Hacking Tool USB Protection Double Password USB Safeguard USB Monitor Tools Etc Hacking By Key loggers,root kits & Spy wares What are Root kits & Key Loggers? Use of Root kits & Key loggers Top Key loggers Tools How Steel Passwords or Many More by Key logger Tools: There Are Many Tools Countermeasures of Spy wares & Key loggers Mobile Hacking Technologies Hack Mobile Phone SMS Forging Tracking Free Calls Hacks Fake SMS Sending Techniques Mobile Phone How to make free Inbound Phone Calls Monitor PC through Mobile Phones Some Another Tricks Of Mobile Hacks (GPRS Hacks Etc)
17 18 19 20 Software, Registry & Application Software Hacking Technologies And Security & Protection Policy Make Your Windows XP Genuine By Registry Etc Modify Your Application Software s Exe File Modification Techniques Make Your Own Software s.exe Files Create Your Own Keys & Cracks of Software Customizing Windows through Registry Customizing Policy of Windows through Registry Many Other Software Hacking Tricks Social Networking Websites Orkut, Facebook Hacking & Security Policies Cases of Orkut, Face book etc Identity Theft Cases Virus on Social Sites Identity Hacking of Facebook & Yahoo Etc Security Tips against Social Websites Privacy Option Credit Card Hacking Credit card cases What is Credit card Fraud? Tools That Use to generate credit card Detection of Credit card Fraud Countermeasures Game Hacking & Computer Crime Forensic Investigation OS Windows Games Hacks Online Game Hacking Game Frauds Computer Crime Forensic Investigation What Is Computer Forensic Role of Computer Forensics Method Use by Computer Forensic 16 Note: These are just the major aspects that we will be discussing, each point will be elaborated in detail with demonstrations of the tools and techniques. THIS WORKSHOP IS ONLY FOR EDUCATIONAL PURPOSE NOT FOR HACKING PURPOSE.
B] Prerequisite for Workshop: Passion to learn new creative things. Knowledge of how to use Computer. Having basic knowledge of Web & Internet. C] Who could attend? College students seeking career in Cyber Security Industry. Person having interest in Hacking & Security. Education Faculty & Staff. IT Professionals, Web Developers, Network Engineers. Students from any branch can attend the workshop. D] Requirements for Workshop: Minimum 100 students for conducting the workshop. A Seminar Hall. A Computer Lab with Internet Connectivity, if possible. Two Projectors. An effective collar microphone with a Sound System. E] Program Benefits & Highlights: Learn & Interact with renowned Industry Experts Receive an unparalleled education on the art of computer security with personal oneon-one attention. Hands on Demonstrations of Latest Hacking Techniques & Tools. Hands on Demonstrations of various cases solved by our Trainer. PowerPoint Presentation, Live Demos, Interactive Question & Answer sessions and comprehensive reading material. Toppers of each workshop to be personally interviewed and will receive a chance to work on security projects. F] Key Benefits of i3indya: Conducted more than 100 workshops & seminars for Students & Professionals across globe. Conducted workshops at Top most institutes of India including IIT s and NIT s. G] Course Material & CDs: Comprehensive course material will be provided to participants. Ethical Hacking Toolkit worth Rs.400 (Containing Tools, Videos, Ebooks, Presentations)
H] Workshop Duration: 2 Days (8 hours/day) I] Charges for Workshop: Rs. 900/- per student. (This includes Registration Kit, Toolkit, and Course Material). J] Certification: Participation Certificate to all students from i3indya Technologies.