Académique Documents
Professionnel Documents
Culture Documents
Principal's Cottage, Welham Boys' School Dehra Dun - 248 001 (Uttarakhand) INDIA Phone +91 97119 44200 Email mailbox@gundeepbindra.com, contact@custardappleonline.com www.custardappleonline.com, www.gundeepbindra.com
Duration
F F F F F F F F F F F F F F F F F F F
Who is a Hacker? What will you learn in workshop ? The term Hacker Types of hackers Communities of Hackers Malicious Hacker Strategies Steps to conduct Ethical Hacking The Anatomy of an IP Address Subnet Addressing Port Numbers MAC Address Tracing an IP Address Network Address Translation Internal VS External IP Addresses Internal VS External IP Addresses #HACKING DEMO MAC Addresses MAC Addresses HACKING DEMO How to find the Remote Computer's MAC Address? Remote Computer's MAC Address? #HACKING DEMO
TOPICS
SESSION I Module 1 Cyber Ethics Ethical Hacking
Duration
40 mins
F Changing your MAC Address F Hackers & Hacking Methodologies F Hiding your identity while performing attacks
Tracing an IP 10 mins
F F F F F F
Introduction WHOIS Traceroute Traceroute #HACKING DEMO Favorite Softwares Countermeasures 30 mins
F F F F F
Hiding Your IP Address IP Spoofing #HACKING DEMO Proxy Servers Proxy Bouncing Countermeasures 20 mins
F Get to know how hacker gather information about victim on internet F Dumpster Diving F Information gathering of websites & networks F Scanning & Structuring of websites F Finding Admin Panel of websites #HACKING DEMO F Get to know how hacker gather information about victim on internet F Information gathering of websites & networks F Google Hacking F Countermeasures
Preparing an Attack & Scanning Methodologies 20 mins
F F F F
TOPICS
SESSION I Module 1 Ethical Hacking Preparing an Attack & Scanning Methodologies
Duration
20 mins
F F F F F F F F F F F F F F F F F
Introduction Softwares Sniffers Passive Sniffing Attacks Keyloggers Keyloggers #HACKING DEMO Trojans Trojans #HACKING DEMO EXE Binders EXE Binders #HACKING DEMO How to control victim's computer using Trojans Binding Trojans with another file Undetection process of Trojans from Antivirus Removal of Trojans from your computer Analysis of Trojans/Virus My Favorite Picks Countermeasures 20 mins
Passwords
F F F F F F F F F F F F F
Introduction Shoulder Surfing Road Sign Hacking Cracking Saved Passwords in Browsers #HACKING DEMO Google Chrome Firefox Mozilla Internet Explorer Tools HACKING DEMO Countermeasures Password Managers #HACKING DEMO Hacking Truths USB Hacking: Linux on the Move Countermeasures
TOPICS
SESSION I Module 2 Cyber Crime Investigation and Steganography
Duration
40 mins
F F F F F F F F F F F F F
Module 3
Types of Cyber Crimes How to report Cyber Crimes Details required while reporting cyber crime Different Logging Systems Investigating Emails ( Email Tracing) Case Studies WebCam Case Savita Bhabhi Credit Card Fraud The Yahoo Case Steganography #HACKING DEMO Watermarking Steganalysis Google Hacking 30 mins
F F F F F F F F F F
Introduction Using Google to HACK Advanced Googling GHDB IP Devices : Cameras Google Hacks #HACKING DEMO Using Google as hacking tool Advanced operators of Google Finding Vulnerable websites using Google Finding Target networks using Google Glimpses of Session II Total (Session I) 10 mins 4 Hours
Break
SESSION II Module 4 Tracing Emails Email Hacking 40 mins
F F F F F
Introduction Email Headers Tracing an Email on the Internet #HACKING DEMO Tracing Location Countermeasures
TOPICS
SESSION II Module 4 Phishing attacks Email Hacking
Duration
20 mins
F F F F F
Making fake pages Making fake pages #HACKING DEMO How to use keyloggers to hack mail ids Social Engineering Techniques Social Engineering Techniques #HACKING DEMO 30 mins
F F F F F F
Introduction Concept Control over your sent messages Nor more regret after a message is sent Control over your sent messages #HACKING DEMO Integration controlling sent messages with GMAIL and other popular email services 60 mins
Email Forging
F F F F F F F F F F
Email Threats Mailbombing The CC & BCC Fields Command Line Sending a mail from any email ID to any Email Sending a mail from any email ID to any Email ID #HACKING DEMO Legal Issues Cracking Email Accounts Securing Email Countermeasures 20 mins
CAPTCHA
F F F F F
Introduction A Good CAPTCHA System reCAPTCHA Mail Hide from reCAPTCHA Cracking CAPTCHA
TOPICS
SESSION II Module 5 Cyber Forensics and Information Security PenTest and Cyber Laws
Duration
40 mins
F F F F F
Vulnerability Assessment and Penetration Testing (VAPT) Thumbs.db Softwares: GFI Languard, Nessus Cyber Law Computer Forensics Glimpses Of Level II Advanced Hacking 30 mins
Module 6
Website Hacking
F F F F F F F
Module 7
My Favorite Facebook Scripts SQL injection attacks Hacked Website Pictures XSS (Cross Site Scripting) #HACKING DEMO Microsoft Vulnerability #HACKING DEMO Google Vulnerability #HACKING DEMO Facebook Vulnerability and other Website Vulnerabilities #HACKING DEMO
15 mins
Phone Hacking
F SMS Spoofing F Send a SMS from any number to any number F Sending of a message from your friends number to your number #HACKING DEMO F Call forging F Calling from your friends number to your number F VOIP Hacking #HACKING DEMO
Total (Session II) Total (Level 1)
15 mins
4 Hours 8 Hours
Workshop Concludes