Activity Stream
48,167 MEMBERS
61067 ONLINE
besthostingforums On YouTube Subscribe to our Newsletter besthostingforums On Twitter besthostingforums On Facebook besthostingforums On facebook groups

Page 1 of 2 12 LastLast
Results 1 to 10 of 14
  1.     
    #1
    Member

    Wink Hacking WorkShop--- Is it Good?

    hello,


    I am planning To Join Workshop For 2 Days in My city they have Came,they are from "IIT Mumbai".Please Tell me is it good?


    Cost :- 20$ (approx)

    Time :- 2 days


    Content:-

    The content of the workshop will be the most exciting part of this event. You will learn cracking the computer systems to exploit the vulnerability and enter in to the computer system.

    Session 1


    1. Ethics & Hacking
      • Hacking history : How it all begin
      • Why is security needed?
      • What is ethical hacking?
      • Ethical Hacker Vs Malicious hacker
      • Types of Hackers
      • Building an approach for ethical hacking
      • Steps in Ethical hacking

    2. Basics of Internet, Networking & Hacking
      • What is a Network?
      • Types of network ? LANs, WANs & WLANs
      • What is Internet?
      • History of the Internet
      • Basic Structure
      • What is a Server?
      • What is an IP Address?
      • What is a domain name?
      • IP-Domain Relation
      • Client-Server Relationship Model
      • Internet networking
      • What is a port?
      • What is Programming?
      • Types of programming languages.
      • What is a Programming loophole or error?
      • Basic explanation of exploitation of loopholes

    3. Information gathering & Google Hacking (Practical)
      • Who is access (Demo)
      • Maltego (Demo)
      • 123people.com (Demo)
      • Ip scaning (Demo)
      • Port scaning (Demo)
      • Network scaning & its tools (Demo)
      • What is Google and how does it work?
      • Google tricks (Demo)
      • Basic hacks (Demo)
      • How can Google hacking help an Ethical Hacker? (Demo)
      • Accesing online remote cameras

    4. Windows security (Practical)
      • Windows security (Demo)
      • Registry (Demo)
      • Port & Services (Demo)
      • Securing Windows
      • Looking for loop holes in windows



    Session 2


    1. SQL injections attacks (Practical)
      • Introduction of SQL
      • What is SQL injection
      • Checking SQL injection vulnerability (demo)
      • Basic strategy of SQL injection (Demo)
      • Getting login credientials using SQL injections (Live Demo)
      • Using SQL to login via middleware language (Demo)
      • URL and Forms (Demo)
      • SQL Query SELECT, DROP etc. (Demo)
      • SQL cheat sheets (Demo)
      • Using source changes to bypass client side validation (Demo)
      • Live demonstration of the attack (Demo)
      • Using SQL injection tools (Demo)
      • Importance of server side validation (Demo)
      • How to protect your system from SQL Injections (Demo)

    2. Man-in-the-middle attack (MITM Attack) (Practical)
      • What is Man-in-the-middle attack?
      • What is Backtrack linux (Most common unix system for ethical hacking)?
      • Preparation for Man-in-the-middle attack (Demo)
      • Setting ettercap tool for the attack (demo)
      • Identifying victim (Demo)
      • Cache poisining (Demo)
      • Routing table modification (Demo)
      • Eveasdroping (Demo)
      • Countermeasures against MITM attack (Demo)

    3. Cross site scripting attack (XSS) (Practical)
      • What is XSS attack?
      • Loopholes causing XSS attack?
      • Identifying victim for XSS Attack (Demo)
      • Preparation for XSS attack (Demo)
      • Introduction to javascript
      • Java script for XSS Attack (Demo)
      • Attacking on website through XSS(Live Demo)
      • Damages caused by XSS attack (Demo)
      • Protecting systems against XSS attack (Demo)



    Session-3: Phishing, cookie grabing & Session hijacking, Social Engineering Attack


    1. Phishing, trojan & viruses
      • What is phishing?
      • Social engineering used in phishing (Demo)
      • Phishing attack (Demo)
      • Phishing sites (Demo)
      • Protection against phishing (Demo)
      • Viruses: Trojans, Worms, Malware, Spyware
      • Modes of spreading
      • Different Ways a Trojan can Get into a System (Demo)
      • Creation of Trojan using cybergate (Demo)
      • Attacking a system using our created trojan (Demo)
      • Indications of a Trojan Attack (Demo)
      • Some Famous Trojans and Ports They Use (Demo)
      • How to Detect Trojans? (Demo)
      • How to Determine which Ports are Listening (Demo)
      • Netstat

    2. Session hijacking & Cookie grabbing:
      • Understanding sessions
      • What are cookies? (Demo)
      • Reading and writing cookies (Demo)
      • Passive Vs Active session hijack (demo)
      • TCP sessions and HTTP sessions (Demo)
      • TCP session hijacking: Telnet (Demo)
      • Stealing Cookies to hijack session using: XSS (Demo)
      • Sniffers (Demo)
      • Spoofing (Demo)
      • Spoofing Vs Hijacking
      • Types of Hijacking
      • Protection against session Hijacking (Demo)

    3. Social Engineering Attacks:
      • Overview of Social Engineering
      • Case Study
      • Example of Social Engineering Attack
      • Java Applet Attack (Demo)



    Session 4: DNS Spoofing, Forging & Cyber laws


    1. DNS Spoofing:
      • What is DNS Spoofing?
      • How does it work?
      • How to secure yourself?
      • DNS Spoofing (Demo)

    2. E-Mail Hacking, forging & tracing:
      • How does an email work?
      • Tracing an email (Demo)
      • Spam
        • What is spamming?
        • Methods of prevention (Demo)
        • Laws about spamming

      • Fake emails generation(Demo)
      • Detecting fake emails (Demo)
      • What is a firewall? & How can it help you
      • How a firewall works
      • What are key loggers? (Demo)
      • Types of key loggers? (Demo)
      • how key logger works? (demo)
      • How to detect key logger? (Demo)

    3. Fake SMS & Calls
      • What is Fake SMS & Call?
      • Method of generating fake SMS & Calls (Demo)
      • Actions to be taken for fake SMS and Calls (Demo)

    4. Charge/penalties against hacking in INDIA
      • IT ACT 2000
      • Cyber crime/terrorism and its type
      • Sections in the Indian constitution Sec. 65, 66 A,B,C, D , 67, 69 etc.
      • Penalty in all sections of Indian constitution








    Orignal LInk :- http://www.techfest.org/home/event/hacktricks_workshops




    thankyou,

    public Reviewed by public on . Hacking WorkShop--- Is it Good? hello, I am planning To Join Workshop For 2 Days in My city they have Came,they are from "IIT Mumbai".Please Tell me is it good?http://thebotnet.com/images/smilies/fuckyea.png Cost :- 20$ (approx) Time :- 2 days Rating: 5

  2.   Sponsored Links

  3.     
    #2
    Member
    Website's:
    grandsoft.org netgfx.org weownpakistan.com emp3dl.com majawed.com.pk
    google around more and collect information related to them! because i never heard abt that!

  4.     
    #3
    Member
    That's a lot of stuff to cover in just 2 days ...

    UltraIMG - Free Image Hosting
    Want to ask me anything to do with UltraIMG?? Send me a PM.
    Chances are that if you leave a message on the forum I might not see it. :)

  5.     
    #4
    Member
    Website's:
    oulee.com ouleehosting.com litespeedhosting.co.uk ddosprotectedhosting.co.uk radiohost.co.uk windowshosting.im
    Can they cover all of those in 2 days?

  6.     
    #5
    Super Member
    Don't sound very trustworthy to me tbh

    So kiss me and smile for me, say that you'll wait for me <'3

  7.     
    #6
    Member
    For $20... what have you got to loose

  8.     
    #7
    Banned
    awesome can any one teach me i will pay 20$

  9.     
    #8
    Member
    The program is organized by Indian Institute of Technology, Mumbai and you guys think they are not trustworthy???wtf . Go to any department in MIT and start counting the number of students from IITs.

    See this show by CBS 60 minutes if you still have any doubts:

    [ame]http://www.youtube.com/watch?v=LGIgJWvt6fw[/ame]

    I would highly recommend this workshop.

  10.     
    #9
    Member
    k! i am applying for it, i wish seats are not full

  11.     
    #10
    Member
    It look rather promising for me.
    Santrex.net - Offshore hosting provider since 2001 Offshore vps | Web hosting | IRC VPS | Seedbox

Page 1 of 2 12 LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. DW's WorkShop
    By dark warrior? in forum Graphics Area
    Replies: 76
    Last Post: 1st Oct 2012, 04:28 PM
  2. Web Designing workshop
    By DINDI in forum Webmaster Discussion
    Replies: 5
    Last Post: 13th Jan 2012, 05:22 PM
  3. which shared hosting Allows hacking forum/hacking tutorial site?
    By The90sKid in forum Hosting Discussion
    Replies: 0
    Last Post: 29th Jul 2011, 09:29 AM
  4. Claw GFX Workshop !!!
    By ClaW in forum Graphics Area
    Replies: 116
    Last Post: 15th May 2011, 06:49 AM
  5. My GFX WorkShop
    By CuTe BoY in forum Graphics Area
    Replies: 0
    Last Post: 10th Nov 2010, 08:43 AM

Tags for this Thread

BE SOCIAL