Vous êtes sur la page 1sur 6

CUSTARD APPLE TECHNOLOGIES

Principal's Cottage, Welham Boys' School Dehra Dun - 248 001 (Uttarakhand) INDIA Phone +91 97119 44200 Email mailbox@gundeepbindra.com, contact@custardappleonline.com www.custardappleonline.com, www.gundeepbindra.com

Workshop Resource Person


Having done his schooling from Delhi Public School, India. Gundeep Singh Bindra graduated in 2011 majoring in Computer Science. During his graduation he developed mechanisms like Invisible Communication through Portable Document File Formats (.pdf). He's been, as a student, an INTERN at organizations like IBM Bangalore. A Cisco Certified Network Associate, he is an independent computer security consultant and has been a resource person for a number of talks/workshops on information security for various business houses, colleges and schools in India and abroad, creating awareness about information security and cyber crimes. He has also been certified under Cisco Certified Network Associate Security (CCNA -Security), Microsoft Technology Associate (MTA) and Microsoft Certified Technology Specialist (MCTS). Soon after his final year, Gundeep launched a book "Gelling with Gmail Labs", which is designed to inform and motivate email users to develop a clear understanding of the plethora of features that Gmail provides. With a number of published articles in PCQuest and InformationWeek to his credit, Gundeep's international papers include those presented at the World Academy of Science, Engineering and Technology (WASET) and IEEE conferences in Amsterdam, Bangkok, China and Massachusetts Institute of Technology, Boston. He is now a member of the Program Committee, for a forthcoming IEEE conference - SocialCom 2012 to be held in Amsterdam in the first week of September.

Workshop Schedule and Contents


TOPICS
SESSION I Module 1 Cyber Ethics Ethical Hacking 40 mins

Duration

F F F F F F F F F F F F F F F F F F F

Who is a Hacker? What will you learn in workshop ? The term Hacker Types of hackers Communities of Hackers Malicious Hacker Strategies Steps to conduct Ethical Hacking The Anatomy of an IP Address Subnet Addressing Port Numbers MAC Address Tracing an IP Address Network Address Translation Internal VS External IP Addresses Internal VS External IP Addresses #HACKING DEMO MAC Addresses MAC Addresses HACKING DEMO How to find the Remote Computer's MAC Address? Remote Computer's MAC Address? #HACKING DEMO

CUSTARD APPLE TECHNOLOGIES


Principal's Cottage, Welham Boys' School Dehra Dun - 248 001 (Uttarakhand) INDIA Phone +91 97119 44200 Email mailbox@gundeepbindra.com, contact@custardappleonline.com www.custardappleonline.com, www.gundeepbindra.com

TOPICS
SESSION I Module 1 Cyber Ethics Ethical Hacking

Duration

40 mins

F Changing your MAC Address F Hackers & Hacking Methodologies F Hiding your identity while performing attacks
Tracing an IP 10 mins

F F F F F F

Introduction WHOIS Traceroute Traceroute #HACKING DEMO Favorite Softwares Countermeasures 30 mins

Hiding your identity and various spoof's while performing attacks

F F F F F

Hiding Your IP Address IP Spoofing #HACKING DEMO Proxy Servers Proxy Bouncing Countermeasures 20 mins

Information Gathering & Planning an Attack

F Get to know how hacker gather information about victim on internet F Dumpster Diving F Information gathering of websites & networks F Scanning & Structuring of websites F Finding Admin Panel of websites #HACKING DEMO F Get to know how hacker gather information about victim on internet F Information gathering of websites & networks F Google Hacking F Countermeasures
Preparing an Attack & Scanning Methodologies 20 mins

F F F F

ping Favorite Softwares Scanning TCP and UDP

CUSTARD APPLE TECHNOLOGIES


Principal's Cottage, Welham Boys' School Dehra Dun - 248 001 (Uttarakhand) INDIA Phone +91 97119 44200 Email mailbox@gundeepbindra.com, contact@custardappleonline.com www.custardappleonline.com, www.gundeepbindra.com

TOPICS
SESSION I Module 1 Ethical Hacking Preparing an Attack & Scanning Methodologies

Duration

20 mins

F Fingerprinting F Passive Fingerprinting F Web Server Fingerprinting


Keyloggers and Trojans and other backdoors 40 mins

F F F F F F F F F F F F F F F F F

Introduction Softwares Sniffers Passive Sniffing Attacks Keyloggers Keyloggers #HACKING DEMO Trojans Trojans #HACKING DEMO EXE Binders EXE Binders #HACKING DEMO How to control victim's computer using Trojans Binding Trojans with another file Undetection process of Trojans from Antivirus Removal of Trojans from your computer Analysis of Trojans/Virus My Favorite Picks Countermeasures 20 mins

Passwords

F F F F F F F F F F F F F

Introduction Shoulder Surfing Road Sign Hacking Cracking Saved Passwords in Browsers #HACKING DEMO Google Chrome Firefox Mozilla Internet Explorer Tools HACKING DEMO Countermeasures Password Managers #HACKING DEMO Hacking Truths USB Hacking: Linux on the Move Countermeasures

CUSTARD APPLE TECHNOLOGIES


Principal's Cottage, Welham Boys' School Dehra Dun - 248 001 (Uttarakhand) INDIA Phone +91 97119 44200 Email mailbox@gundeepbindra.com, contact@custardappleonline.com www.custardappleonline.com, www.gundeepbindra.com

TOPICS
SESSION I Module 2 Cyber Crime Investigation and Steganography

Duration

40 mins

F F F F F F F F F F F F F
Module 3

Types of Cyber Crimes How to report Cyber Crimes Details required while reporting cyber crime Different Logging Systems Investigating Emails ( Email Tracing) Case Studies WebCam Case Savita Bhabhi Credit Card Fraud The Yahoo Case Steganography #HACKING DEMO Watermarking Steganalysis Google Hacking 30 mins

F F F F F F F F F F

Introduction Using Google to HACK Advanced Googling GHDB IP Devices : Cameras Google Hacks #HACKING DEMO Using Google as hacking tool Advanced operators of Google Finding Vulnerable websites using Google Finding Target networks using Google Glimpses of Session II Total (Session I) 10 mins 4 Hours

Break
SESSION II Module 4 Tracing Emails Email Hacking 40 mins

F F F F F

Introduction Email Headers Tracing an Email on the Internet #HACKING DEMO Tracing Location Countermeasures

CUSTARD APPLE TECHNOLOGIES


Principal's Cottage, Welham Boys' School Dehra Dun - 248 001 (Uttarakhand) INDIA Phone +91 97119 44200 Email mailbox@gundeepbindra.com, contact@custardappleonline.com www.custardappleonline.com, www.gundeepbindra.com

TOPICS
SESSION II Module 4 Phishing attacks Email Hacking

Duration

20 mins

F F F F F

Making fake pages Making fake pages #HACKING DEMO How to use keyloggers to hack mail ids Social Engineering Techniques Social Engineering Techniques #HACKING DEMO 30 mins

Email Mission Impossible Style

F F F F F F

Introduction Concept Control over your sent messages Nor more regret after a message is sent Control over your sent messages #HACKING DEMO Integration controlling sent messages with GMAIL and other popular email services 60 mins

Email Forging

F F F F F F F F F F

Email Threats Mailbombing The CC & BCC Fields Command Line Sending a mail from any email ID to any Email Sending a mail from any email ID to any Email ID #HACKING DEMO Legal Issues Cracking Email Accounts Securing Email Countermeasures 20 mins

CAPTCHA

F F F F F

Introduction A Good CAPTCHA System reCAPTCHA Mail Hide from reCAPTCHA Cracking CAPTCHA

CUSTARD APPLE TECHNOLOGIES


Principal's Cottage, Welham Boys' School Dehra Dun - 248 001 (Uttarakhand) INDIA Phone +91 97119 44200 Email mailbox@gundeepbindra.com, contact@custardappleonline.com www.custardappleonline.com, www.gundeepbindra.com

TOPICS
SESSION II Module 5 Cyber Forensics and Information Security PenTest and Cyber Laws

Duration

40 mins

F F F F F

Vulnerability Assessment and Penetration Testing (VAPT) Thumbs.db Softwares: GFI Languard, Nessus Cyber Law Computer Forensics Glimpses Of Level II Advanced Hacking 30 mins

Module 6

Website Hacking

F F F F F F F
Module 7

My Favorite Facebook Scripts SQL injection attacks Hacked Website Pictures XSS (Cross Site Scripting) #HACKING DEMO Microsoft Vulnerability #HACKING DEMO Google Vulnerability #HACKING DEMO Facebook Vulnerability and other Website Vulnerabilities #HACKING DEMO

15 mins

Phone Hacking

F SMS Spoofing F Send a SMS from any number to any number F Sending of a message from your friends number to your number #HACKING DEMO F Call forging F Calling from your friends number to your number F VOIP Hacking #HACKING DEMO
Total (Session II) Total (Level 1)

15 mins

4 Hours 8 Hours

Workshop Concludes

Vous aimerez peut-être aussi