Results 1 to 10 of 14
-
10th Sep 2012, 11:03 AM #1OPMember
Hacking WorkShop--- Is it Good?
hello,
I am planning To Join Workshop For 2 Days in My city they have Came,they are from "IIT Mumbai".Please Tell me is it good?
Cost :- 20$ (approx)
Time :- 2 days
Content:-
The content of the workshop will be the most exciting part of this event. You will learn cracking the computer systems to exploit the vulnerability and enter in to the computer system.
Session 1
- Ethics & Hacking
- Hacking history : How it all begin
- Why is security needed?
- What is ethical hacking?
- Ethical Hacker Vs Malicious hacker
- Types of Hackers
- Building an approach for ethical hacking
- Steps in Ethical hacking
- Basics of Internet, Networking & Hacking
- What is a Network?
- Types of network ? LANs, WANs & WLANs
- What is Internet?
- History of the Internet
- Basic Structure
- What is a Server?
- What is an IP Address?
- What is a domain name?
- IP-Domain Relation
- Client-Server Relationship Model
- Internet networking
- What is a port?
- What is Programming?
- Types of programming languages.
- What is a Programming loophole or error?
- Basic explanation of exploitation of loopholes
- Information gathering & Google Hacking (Practical)
- Who is access (Demo)
- Maltego (Demo)
- 123people.com (Demo)
- Ip scaning (Demo)
- Port scaning (Demo)
- Network scaning & its tools (Demo)
- What is Google and how does it work?
- Google tricks (Demo)
- Basic hacks (Demo)
- How can Google hacking help an Ethical Hacker? (Demo)
- Accesing online remote cameras
- Windows security (Practical)
- Windows security (Demo)
- Registry (Demo)
- Port & Services (Demo)
- Securing Windows
- Looking for loop holes in windows
Session 2
- SQL injections attacks (Practical)
- Introduction of SQL
- What is SQL injection
- Checking SQL injection vulnerability (demo)
- Basic strategy of SQL injection (Demo)
- Getting login credientials using SQL injections (Live Demo)
- Using SQL to login via middleware language (Demo)
- URL and Forms (Demo)
- SQL Query SELECT, DROP etc. (Demo)
- SQL cheat sheets (Demo)
- Using source changes to bypass client side validation (Demo)
- Live demonstration of the attack (Demo)
- Using SQL injection tools (Demo)
- Importance of server side validation (Demo)
- How to protect your system from SQL Injections (Demo)
- Man-in-the-middle attack (MITM Attack) (Practical)
- What is Man-in-the-middle attack?
- What is Backtrack linux (Most common unix system for ethical hacking)?
- Preparation for Man-in-the-middle attack (Demo)
- Setting ettercap tool for the attack (demo)
- Identifying victim (Demo)
- Cache poisining (Demo)
- Routing table modification (Demo)
- Eveasdroping (Demo)
- Countermeasures against MITM attack (Demo)
- Cross site scripting attack (XSS) (Practical)
- What is XSS attack?
- Loopholes causing XSS attack?
- Identifying victim for XSS Attack (Demo)
- Preparation for XSS attack (Demo)
- Introduction to javascript
- Java script for XSS Attack (Demo)
- Attacking on website through XSS(Live Demo)
- Damages caused by XSS attack (Demo)
- Protecting systems against XSS attack (Demo)
Session-3: Phishing, cookie grabing & Session hijacking, Social Engineering Attack
- Phishing, trojan & viruses
- What is phishing?
- Social engineering used in phishing (Demo)
- Phishing attack (Demo)
- Phishing sites (Demo)
- Protection against phishing (Demo)
- Viruses: Trojans, Worms, Malware, Spyware
- Modes of spreading
- Different Ways a Trojan can Get into a System (Demo)
- Creation of Trojan using cybergate (Demo)
- Attacking a system using our created trojan (Demo)
- Indications of a Trojan Attack (Demo)
- Some Famous Trojans and Ports They Use (Demo)
- How to Detect Trojans? (Demo)
- How to Determine which Ports are Listening (Demo)
- Netstat
- Session hijacking & Cookie grabbing:
- Understanding sessions
- What are cookies? (Demo)
- Reading and writing cookies (Demo)
- Passive Vs Active session hijack (demo)
- TCP sessions and HTTP sessions (Demo)
- TCP session hijacking: Telnet (Demo)
- Stealing Cookies to hijack session using: XSS (Demo)
- Sniffers (Demo)
- Spoofing (Demo)
- Spoofing Vs Hijacking
- Types of Hijacking
- Protection against session Hijacking (Demo)
- Social Engineering Attacks:
- Overview of Social Engineering
- Case Study
- Example of Social Engineering Attack
- Java Applet Attack (Demo)
Session 4: DNS Spoofing, Forging & Cyber laws
- DNS Spoofing:
- What is DNS Spoofing?
- How does it work?
- How to secure yourself?
- DNS Spoofing (Demo)
- E-Mail Hacking, forging & tracing:
- How does an email work?
- Tracing an email (Demo)
- Spam
- What is spamming?
- Methods of prevention (Demo)
- Laws about spamming
- Fake emails generation(Demo)
- Detecting fake emails (Demo)
- What is a firewall? & How can it help you
- How a firewall works
- What are key loggers? (Demo)
- Types of key loggers? (Demo)
- how key logger works? (demo)
- How to detect key logger? (Demo)
- Fake SMS & Calls
- What is Fake SMS & Call?
- Method of generating fake SMS & Calls (Demo)
- Actions to be taken for fake SMS and Calls (Demo)
- Charge/penalties against hacking in INDIA
- IT ACT 2000
- Cyber crime/terrorism and its type
- Sections in the Indian constitution Sec. 65, 66 A,B,C, D , 67, 69 etc.
- Penalty in all sections of Indian constitution
Orignal LInk :- http://www.techfest.org/home/event/hacktricks_workshops
thankyou,
public Reviewed by public on . Hacking WorkShop--- Is it Good? hello, I am planning To Join Workshop For 2 Days in My city they have Came,they are from "IIT Mumbai".Please Tell me is it good?http://thebotnet.com/images/smilies/fuckyea.png Cost :- 20$ (approx) Time :- 2 days Rating: 5
- Ethics & Hacking
-
10th Sep 2012, 11:13 AM #2MemberWebsite's:
grandsoft.org netgfx.org weownpakistan.com emp3dl.com majawed.com.pkgoogle around more and collect information related to them! because i never heard abt that!
-
10th Sep 2012, 11:24 AM #3Member
That's a lot of stuff to cover in just 2 days ...
UltraIMG - Free Image Hosting
Want to ask me anything to do with UltraIMG?? Send me a PM.
Chances are that if you leave a message on the forum I might not see it. :)
-
10th Sep 2012, 11:37 AM #4MemberWebsite's:
oulee.com ouleehosting.com litespeedhosting.co.uk ddosprotectedhosting.co.uk radiohost.co.uk windowshosting.imCan they cover all of those in 2 days?
-
10th Sep 2012, 11:57 AM #5Super Member
Don't sound very trustworthy to me tbh
So kiss me and smile for me, say that you'll wait for me <'3
-
10th Sep 2012, 12:04 PM #6Member
For $20... what have you got to loose
-
10th Sep 2012, 12:11 PM #7Banned
awesome can any one teach me i will pay 20$
-
10th Sep 2012, 12:35 PM #8Member
The program is organized by Indian Institute of Technology, Mumbai and you guys think they are not trustworthy???wtf . Go to any department in MIT and start counting the number of students from IITs.
See this show by CBS 60 minutes if you still have any doubts:
[ame]http://www.youtube.com/watch?v=LGIgJWvt6fw[/ame]
I would highly recommend this workshop.
-
11th Sep 2012, 08:11 AM #9OPMember
k! i am applying for it, i wish seats are not full
-
12th Sep 2012, 11:43 AM #10Member
It look rather promising for me.
Santrex.net - Offshore hosting provider since 2001 Offshore vps | Web hosting | IRC VPS | Seedbox
Sponsored Links
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Similar Threads
-
DW's WorkShop
By dark warrior? in forum Graphics AreaReplies: 76Last Post: 1st Oct 2012, 04:28 PM -
Web Designing workshop
By DINDI in forum Webmaster DiscussionReplies: 5Last Post: 13th Jan 2012, 05:22 PM -
which shared hosting Allows hacking forum/hacking tutorial site?
By The90sKid in forum Hosting DiscussionReplies: 0Last Post: 29th Jul 2011, 09:29 AM -
Claw GFX Workshop !!!
By ClaW in forum Graphics AreaReplies: 116Last Post: 15th May 2011, 06:49 AM -
My GFX WorkShop
By CuTe BoY in forum Graphics AreaReplies: 0Last Post: 10th Nov 2010, 08:43 AM
themaCreator - create posts from...
Version 3.24 released. Open older version (or...