Ethical Hacking
Ethical Hacking
Day 1 (Session 1)
Ethics and Hacking
Windows Hacking
To exploit the vulnerabilities of windows using live devices and Universal Serial Bus (USB).
Steganography
What is Steganography?
Hiding data behind Images, PDFs, Audio and Videos files
Day 1 (Session 2)
Basics Of Internet, Networking And Hacking
What is a Network?
Types of network – LANs, WANs & WLANs
What is Internet?
Basic Structure
What is a Server?
What is an IP Address?
What is a domain name?
IP-Domain Relation
Client-Server Relationship Model
Internet networking
Set up Ad-hoc networks
Basic explanation of exploitation of loopholes
Introduction of SQL
What are SQL INJECTION and DVWA?
Checking SQL injection vulnerability (Demo)
Basic strategy of SQL injection (Demo)
Getting login credentials using SQL injections (Live Demo)
URL and Forms (Demo)
SQL Query SELECT, DROP etc. (Demo)
SQL cheat sheets (Demo)
Using source changes to bypass client side validation (Demo)
Live demonstration of the attack (Demo)
Using SQL injection tools (Demo)
How to protect your system from attacks
Day 2 (Session 3)
Man In The Middle Attack(MITM)
What is phishing?
Preparation for phishing
Introduction to the concepts of Trojans, worms and viruses
Day 2 (Session 4)
Email FORGING AND CYBER LAWS
Zonal Competition
After the hand on theory and practical experience from the workshop, Zonal Round Competition will
be conducted for the participants.
Certificate Distribution
On behalf of Robosapiens Technologies Pvt. Ltd. Certificate of Merit will be provided to all Zonal
Round Winners and Certificate of Participation will be provided to all the Zonal Round Participants
(Excluding Merit Participants).