0% found this document useful (0 votes)
42 views3 pages

Ethical Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views3 pages

Ethical Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Ethical Hacking

Day 1 (Session 1)
Ethics and Hacking

 Hacking History- How It All Began


 Need For Ethical Hacking
 Why We Require Ethical Hackers
 Types Of Hackers
 Steps In Ethical Hacking
 Scopes In Hacking

Windows Hacking

 To exploit the vulnerabilities of windows using live devices and Universal Serial Bus (USB).

Steganography

 What is Steganography?
 Hiding data behind Images, PDFs, Audio and Videos files

Day 1 (Session 2)
Basics Of Internet, Networking And Hacking

 What is a Network?
 Types of network – LANs, WANs & WLANs
 What is Internet?
 Basic Structure
 What is a Server?
 What is an IP Address?
 What is a domain name?
 IP-Domain Relation
 Client-Server Relationship Model
 Internet networking
 Set up Ad-hoc networks
 Basic explanation of exploitation of loopholes

SQL Injection Using DVWA

 Introduction of SQL
 What are SQL INJECTION and DVWA?
 Checking SQL injection vulnerability (Demo)
 Basic strategy of SQL injection (Demo)
 Getting login credentials using SQL injections (Live Demo)
 URL and Forms (Demo)
 SQL Query SELECT, DROP etc. (Demo)
 SQL cheat sheets (Demo)
 Using source changes to bypass client side validation (Demo)
 Live demonstration of the attack (Demo)
 Using SQL injection tools (Demo)
 How to protect your system from attacks

Day 2 (Session 3)
Man In The Middle Attack(MITM)

 What is Backtrack Linux?


 What is Man-in-the-middle attack?
 Preparation for Man-in-the-middle attack (Demo)
 Setting Ettercap tool for the attack (Demo)
 Identifying victim (Demo)
 Countermeasures against MITM attack (Demo)

Phishing, Trojan, Worms And Viruses

 What is phishing?
 Preparation for phishing
 Introduction to the concepts of Trojans, worms and viruses

Day 2 (Session 4)
Email FORGING AND CYBER LAWS

 What is Email Forging?


 How to generate a Fake Mail?
 How to detect a fake Email?
 Introduction to cyber laws
 IT Acts, Rules and Regulation

Zonal Competition
After the hand on theory and practical experience from the workshop, Zonal Round Competition will
be conducted for the participants.

Certificate Distribution

On behalf of Robosapiens Technologies Pvt. Ltd. Certificate of Merit will be provided to all Zonal
Round Winners and Certificate of Participation will be provided to all the Zonal Round Participants
(Excluding Merit Participants).

You might also like