0% found this document useful (0 votes)
106 views91 pages

Batch-8 Project Allocation

Uploaded by

yashnagwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views91 pages

Batch-8 Project Allocation

Uploaded by

yashnagwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 91

Email Address Full Name

[email protected] Harshal Moon

[email protected]
c.in Suhani Gharde

[email protected] Santhosh Kumar R

[email protected] Kanishkar S
karthikeyang25092004@gmai Karthikeyan G
l.com

[email protected] Pandeeshwaran N

[email protected] Sivadharani A

[email protected] Ankit Kumar Ravi


[email protected] Aayushi Singh

[email protected] Navin Kumar

[email protected] Aayushi Singh

gomasanageshwari753@gmai Gomasa Nahgeshwari


l.com

[email protected] Saunav Barman

chegireddyabhivarshreddy@g Chegireddy Abhivarsh


mail.com Reddy
[email protected] Aditya Hansda

[email protected] Abhirami D Nair

[email protected] Abhijaya Up

[email protected] Nayana S Anand


m

sanskrutiwaghmare5076@gm
ail.com Sanskruti Waghmare

[email protected] Medhavi Awale


[email protected]
m Shreya Ambade

[email protected] Arati Zinjurde

[email protected] Nirmal Kumar

[email protected] Sandeep Kumar

[email protected]
om Priyanshi Chauhan
[email protected] Anjan Boro

[email protected] Kavita Kumari

[email protected] Dilip Kumar

[email protected] Mani Kant Kumar


[email protected]
m Palak Chandak

[email protected] Gayatri Mankar

[email protected] Esha Madavi

[email protected] Sakshi Pise

[email protected] Om Arsod
[email protected] Aditya Mandlik

[email protected]
m Vishwas Masram

[email protected] Tushar Bansod

[email protected] Pratik Nikam

[email protected] Rahul Khamkar


[email protected] Rahul Brahmane

[email protected] Rajnandini Patil

[email protected]
m Saloni Wankhade

[email protected] Vighnesh Masram

[email protected] Anvayi Phadatare

[email protected] Vivek
[email protected] Yash Nagwal

mohanasanthosh0210@gmail Mohana Santhosh


.com

hkarthikhunasikaikarthika@g
mail.com H Karthika

[email protected] Satyaprakash Rahul


om
[email protected] Arun Talawar

mallikarjunhosamani429@gm
ail.com Mallikarjun Hosamani

[email protected] Monika S
om

[email protected] Anubhav Batsyayan

[email protected]
m Sneha Kumari

[email protected] Priya Anand


[email protected] Kevin Sebastian

[email protected]
m Priyanshu Negi

[email protected] Dhruv Gaur


[email protected] Kundan Gupta
m

[email protected] Anurag Bansode

[email protected] Gurram Harshith

[email protected]
om Rakesh Arumalla

[email protected] Shubham Asole


[email protected] Lakshay

nishantthakurs7519@iiitmani
pur.ac.in Nishant

[email protected]
.in Lalit Kumar Sharma

kethavathdevanaik85@gmail. Deva Kethavath


com

aakankshakhandare2@gmail. Aakanksha Khandare


com
[email protected] Rohan Katale

[email protected] Nunsavath Saikiran

[email protected] Prajwal Khadse

[email protected] Saurav Anand


[email protected] Wilson Toppo

arkaprava.2023ug1036@iiitra
nchi.ac.in Arkaprava Mondal

[email protected]
c.in Vidushi Mehra
[email protected] Navya

[email protected]
m S Simanchal Rao

[email protected] Yash Raj


[email protected] Swathi P

[email protected] Venkata Rishitha Gangula

[email protected] Ankush Kumar

[email protected]
m Aman Kanoujia
[email protected] Shivani Vishnoi
m

[email protected]
m Vivek Mishra

[email protected] Shivam Kumar


m

[email protected]
m Ayush Mishra
[email protected] Rohit Kumar

[email protected] Sonu Ranjan

[email protected] Rhythm Patel

[email protected] Niket Bhatt

[email protected] Deepak Suda


ruparanichakkera303@gmail. Ruparani Chakkera
com

[email protected] Parab Munda

[email protected] Ritik Nayak

[email protected] Ummar Ramzan

[email protected]. Rinav Hansa


in

[email protected]
om Waseema Firdous Qadri

[email protected] Lalit Rawat

[email protected] Shiv Om Narang

[email protected] Sourav Das


[email protected] Talib Hussain
m

[email protected] Langma Debbarma

[email protected] Deepjit Das

[email protected] Anjana Tirkey

[email protected] Nang Suchani Longkan

[email protected] George C Cibichen


m

[email protected] Reddy Sekhar Reddy


m Chilekampalli

[email protected] Anagha S

[email protected] Anirudh Prasad Naini

balakrishnanallamotu04@gm Balakrishna Nallamothu


ail.com

[email protected] Balija Nikhil


[email protected] Venkata Durga Siva
c.in Sairam Sirigineedi

[email protected] Ravi Kumar

[email protected] Jwngsha Boro

[email protected] Mohan Mridha

[email protected] Mahidhar Reddy


m Bhumireddy

[email protected] Achal Bambole

[email protected] Pritesh Shinde

[email protected] Onkar Patil

[email protected] Rutuja Chabukswar


[email protected]
om Swapnil Kamble

[email protected] Sonali Kamble

[email protected] Dipti Mane

tusharchaudhari1809@gmail. Tushar Chaudhari


com

[email protected] Tanisha Jondhale


om

[email protected] Ishatitare Titare

[email protected] Charwak Karle

[email protected] Samiksha Sherkure


m

[email protected] Ashray Wankhede


om
[email protected] Tanuja Patil

[email protected] Lawkesh Dhurve


m

[email protected] Arya J S

[email protected] Shivkumar Nevhal

[email protected] Rohit Paikrao

[email protected] Mayuri Pandhare


m

[email protected] Sree Mathi

[email protected] K Alfred Deva

[email protected] Prerna Dangara


[email protected] Javin Raj Abraham

[email protected] Eslavath Lakkiram

chandelpratibhasingh3@gmai Pratibha Singh Chandel


l.com

[email protected] Sharath N

[email protected] Jyothi Bai R

[email protected] Rvijay Kumar


om

[email protected] Mithun Srinivas

[email protected] Yashaswini B N

[email protected] Harshitha R B
[email protected] Amulya A

[email protected] Vedant Shelke


m

[email protected] Kiran Lamani

prajwalmashewadi.99@gmail Prajwal Mashewadi


.com

[email protected] Anjali Kugate

mangaloorkarsanjana@gmail. Sanjana Mangaloorkar


com

[email protected] Abhishek Kavadi

[email protected] Akash M Dwasal


[email protected] Priya Kadam

[email protected] Ankita Kamble


m

[email protected] Akash Metkari


m

[email protected] Sakshi Shinde


m
trupti.magdum@walchandsa Trupti Magdum
ngli.ac.in

[email protected] Mayur Bambale

ronakkumar.hurkat@walchan Ronakkumar Hurkat


dsangli.ac.in

samruddhi.salunkhe@walcha Samruddhi Salunkhe


ndsangli.ac.in

purva.markam@walchandsan Purva Markam


gli.ac.in
sachin.kondawar@walchands Sachin Kondawar
angli.ac.in

vaishnavi.patil5@walchandsa Vaishnavi Patil


ngli.ac.in

[email protected] Uzma Khatib

[email protected] Atharva Tangadi

pratiksha.bramhane@walcha Pratiksha Bramhane


ndsangli.ac.in

gita.madhe@walchandsangli. Gita Madhe


ac.in

gavaraisamruddhi1008@gmai Samruddhi Gavarai


l.com
siddharthswami2005@gmail.
com Siddharth Swami

prathameshhtale128@gmail. Prathamesh Tale


com

[email protected] Mohd Hafiz Khan

[email protected] Chaitanya Patil


om

[email protected] Abhijeet Kamble


om

[email protected] Ketaki Kalyani

yash.patil11@walchandsangli Yash Patil


.ac.in
College

College of Engineering Pune


Technological University

College of Engineering Pune


Technological University

Anna University Chennai

Anna University Chennai


Anna University Chennai

Bharathidasan Institute of
Technology Anna University

Bharathidasan Institute of
Technology Anna University

BIT Sindri
BIT Sindri

BIT Sindri

BIT Sindri

Central Institute Of
Technology Kokrajhar

Central Institute Of
Technology Kokrajhar

Central University of Jammu


Central University of
Jharkhand Ranchi

College of Engineering
Attingal

College of Engineering
Muttathara

College of Engineering
Trivandrum

Dr Babasaheb Ambedkar
Technological University

Dr Babasaheb Ambedkar
Technological University
Dr Babasaheb Ambedkar
Technological University

Dr Babasaheb Ambedkar
Technological University

Dr Bhimrao Ambedkar
University Agra

Dr Bhimrao Ambedkar
University Agra

Dr Bhimrao Ambedkar
University Agra
DUIET Dibrugarh University

Gaya College of Engineering

Gaya College of Engineering

Gaya College of Engineering


Government College of
Engineering Amravati

Government College of
Engineering Amravati

Government College of
Engineering Amravati

Government College of
Engineering Amravati

Government College of
Engineering Amravati
Government College of
Engineering Aurangabad

Government College of
Engineering Aurangabad

Government College of
Engineering Jalgaon

Government College of
Engineering Jalgaon

Government College of
Engineering Jalgaon
Government College of
Engineering Jalgaon

Government College of
Engineering Jalgaon

Government College of
Engineering Nagpur

Government College of
Engineering Satara

Government College of
Engineering Satara

Government Engineering
College Ajmer
Government Engineering
College Ajmer

Government Engineering
College Barton Hill
Thiruvananthapuram

Government Engineering
college Kodagu

Government Engineering
College Palamu
Government Engineering
College Ramanagar

Government Engineering
College Ramanagar

Government Engineering
College Ramanagar

Government Engineering
College Sheikhpura

Government Engineering
College Sheohar

Government Engineering
College Vaishali
Government Engineering
College Wayanad

Govind Ballabh Pant


Engineering College Garhwal

Govind Ballabh Pant


Engineering College Garhwal
Govt Mahila Engineering
College Ajmer

IIIT Trichy

IIIT Trichy

IIIT Trichy

IIITDM Kancheepuram
Indian Institute of
Information Technology
Manipur

Indian Institute of
Information Technology
Manipur

Indian Institute of
Information Technology
Manipur

Indian Institute of
Information Technology
Nagpur
Indian Institute of
Information Technology
Pune
Indian Institute of
Information Technology
Pune

Indian Institute of
Information Technology
Pune

Indian Institute of
Information Technology
Pune

Indian Institute of
Information Technology
Ranchi
Indian Institute of
Information Technology
Ranchi

Indian Institute of
Information Technology
Ranchi

Indira Gandhi Delhi Technical


University For Women
Indira Gandhi Delhi Technical
University For Women

Indira Gandhi Institute of


Technology Sarang

Jawaharlal Nehru University


JNTUA College of
Engineering Anantapur

JNTUA College of
Engineering Anantapur

Kamla Nehru Institute of


Technology Sultanpur

Kamla Nehru Institute of


Technology Sultanpur
Kamla Nehru Institute of
Technology Sultanpur

Lucknow University

Mahatma Gandhi Central


University Motihari

MMMUT Gorakhpur
MMMUT Gorakhpur

Motihari College Of
Engineering

National Forensic Sciences


University Gandhinagar

National Forensic Sciences


University Gandhinagar

National Institute of
Technology Tiruchirappalli
National Institute of
Technology Tiruchirappalli

National Institute of
Technology Tiruchirappalli

National Institute of
Technology Tiruchirappalli

National Institute of
Technology Srinagar

National Institute of
Technology Srinagar

National Institute of
Technology Srinagar

National Institute of
Technology Srinagar

National Institute of
Technology Srinagar

NIT Agartala
NIT Agartala

NIT Agartala

NIT Agartala

NIT Agartala

NIT Arunachal

NIT Calicut

NIT Calicut

NIT Calicut

NIT Manipur

NIT Puducherry

NIT Warangal
NIT Warangal

NITK Surathkal

North Eastern Hill University


Shillong

North Eastern Hill University


Shillong
Puducherry Technological
University

Rashtrasant Tukadoji
Maharaj Nagpur University

Sardar Patel College of


Engineering Mumbai

Shivaji University Kolhapur

Shivaji University Kolhapur


Shivaji University Kolhapur

Shreemati Nathibai Damodar


Thackersey Womens
University Mumbai

Shreemati Nathibai Damodar


Thackersey Womens
University Mumbai

Shri Guru Gobind Singhji


Institute of Engineering and
Technology Nanded
Shri Guru Gobind Singhji
Institute of Engineering and
Technology Nanded
Shri Guru Gobind Singhji
Institute of Engineering and
Technology Nanded
Shri Guru Gobind Singhji
Institute of Engineering and
Technology Nanded
Shri Guru Gobind Singhji
Institute of Engineering and
Technology Nanded
Shri Guru Gobind Singhji
Institute of Engineering and
Technology Nanded
Shri Guru Gobind Singhji
Institute of Engineering and
Technology Nanded

Shri Guru Gobind Singhji


Institute of Engineering and
Technology Nanded
Sree Chitra Thirunal College
of Engineering
Swami Ramanand Teerth
Marathwada
University Nanded
Swami Ramanand Teerth
Marathwada
University Nanded
Swami Ramanand Teerth
Marathwada
University Nanded
Thiagarajar College of
Engineering

Thiagarajar College of
Engineering

UIET Bikaner Technical


University
University College of
Engineering Osmania
University Hyderabad

University College of
Engineering Osmania
University Hyderabad

University of Delhi

University of Mysore Mysore

University of Mysore Mysore

University Visvesvaraya
College of Engineering
Bangalore
University Visvesvaraya
College of Engineering
Bangalore
University Visvesvaraya
College of Engineering
Bangalore
University Visvesvaraya
College of Engineering
Bangalore
University Visvesvaraya
College of Engineering
Bangalore

Visvesvaraya National
Institute of Technology
Nagpur

Visvesvaraya Technological
University Belgaum

Visvesvaraya Technological
University Belgaum
Visvesvaraya Technological
University Belgaum

Visvesvaraya Technological
University Belgaum

Visvesvaraya Technological
University Belgaum

Visvesvaraya Technological
University Belgaum
Visvesvaraya Technological
University Belgaum

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli
Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli
Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli
Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli

Walchand College of
Engineering Sangli
Project Topics

Finding the digital evidences for planning for


mass shooting using Disk Forensics. (Data will
be provided).

Audio forensics to match the suspect voice from


the received sample file from the suspect/victim
device.

Exploring Tools and Websites for Detecting Fake


News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use
Clickjacking Exercise: The Case of the Hidden
Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )

Analyzing Phishing Techniques That Bypass


Spam Detection.(Atlest 4 methods)
Grab Digital Foot-printing & its Counter
measures ( atlest 4 tools)

Finding the digital evidences for planning for


mass shooting using Disk Forensics. (Data will
be provided).

Audio forensics to match the suspect voice from


the received sample file from the suspect/victim
device.

Implementation and Detection of Ransomware


Attacks

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies
Analyzing Phishing Techniques That Bypass
Spam Detection.(Atlest 4 methods)

Grab Digital Foot-printing & its Counter


measures ( atlest 4 tools)

Audio forensics to match the suspect voice from


the received sample file from the suspect/victim
device.

Implementation and Detection of Ransomware


Attacks

Exploring Tools and Websites for Detecting Fake


News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts

Building a Ransomware Simulator: Design , build


& encrypts a test file and displays a ransom
message on VM.
Building a Secure Website: Develop website
using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )

Analyzing Phishing Techniques That Bypass


Spam Detection.(Atlest 4 methods)

Grab Digital Foot-printing & its Counter


measures ( atlest 4 tools)

Finding the digital evidences for planning for


mass shooting using Disk Forensics. (Data will
be provided).
Audio forensics to match the suspect voice from
the received sample file from the suspect/victim
device.

Implementation and Detection of Ransomware


Attacks

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use

Clickjacking Exercise: The Case of the Hidden


Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.
File upload vulnerabilities - Identification &
Exploitation & recommend potential mitigation
strategies

Building a Secure Website: Develop website


using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )

Analyzing Phishing Techniques That Bypass


Spam Detection.(Atlest 4 methods)

Audio forensics to match the suspect voice from


the received sample file from the suspect/victim
device.
Implementation and Detection of Ransomware
Attacks

Exploring Tools and Websites for Detecting Fake


News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use

Building a Secure Website: Develop website


using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )
Analyzing Phishing Techniques That Bypass
Spam Detection.(Atlest 4 methods)

Finding the digital evidences for planning for


mass shooting using Disk Forensics. (Data will
be provided).

Audio forensics to match the suspect voice from


the received sample file from the suspect/victim
device.

Implementation and Detection of Ransomware


Attacks

Exploring Tools and Websites for Detecting Fake


News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts

Building a Ransomware Simulator: Design , build


& encrypts a test file and displays a ransom
message on VM.
Lateral Movement to Dominate Your Network.
Beyond the Breach: Show How Attackers Use

Clickjacking Exercise: The Case of the Hidden


Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

Building a Secure Website: Develop website


using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Analyzing Phishing Techniques That Bypass


Spam Detection.(Atlest 4 methods)
Grab Digital Foot-printing & its Counter
measures ( atlest 4 tools)

Audio forensics to match the suspect voice from


the received sample file from the suspect/victim
device.

Implementation and Detection of Ransomware


Attacks

Exploring Tools and Websites for Detecting Fake


News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts

Building a Ransomware Simulator: Design , build


& encrypts a test file and displays a ransom
message on VM.

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use
Clickjacking Exercise: The Case of the Hidden
Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

Building a Secure Website: Develop website


using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )
Analyzing Phishing Techniques That Bypass
Spam Detection.(Atlest 4 methods)

Grab Digital Foot-printing & its Counter


measures ( atlest 4 tools)

Audio forensics to match the suspect voice from


the received sample file from the suspect/victim
device.

Exploring Tools and Websites for Detecting Fake


News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use
Clickjacking Exercise: The Case of the Hidden
Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies

Finding the digital evidences for planning for


mass shooting using Disk Forensics. (Data will
be provided).

Implementation and Detection of Ransomware


Attacks

Implementation and Detection of Ransomware


Attacks
Building a Secure Website: Develop website
using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Building a Ransomware Simulator: Design , build


& encrypts a test file and displays a ransom
message on VM.

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use

Finding the digital evidences for planning for


mass shooting using Disk Forensics. (Data will
be provided).
Building a Ransomware Simulator: Design , build
& encrypts a test file and displays a ransom
message on VM.

Exploring Tools and Websites for Detecting Fake


News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts

Building a Ransomware Simulator: Design , build


& encrypts a test file and displays a ransom
message on VM.
Clickjacking Exercise: The Case of the Hidden
Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

Building a Secure Website: Develop website


using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )
Finding the digital evidences for planning for
mass shooting using Disk Forensics. (Data will
be provided).

Clickjacking Exercise: The Case of the Hidden


Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies

Exploring Tools and Websites for Detecting Fake


News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts
Grab Digital Foot-printing & its Counter
measures ( atlest 4 tools)

Building a Ransomware Simulator: Design , build


& encrypts a test file and displays a ransom
message on VM.

Clickjacking Exercise: The Case of the Hidden


Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies
Grab Digital Foot-printing & its Counter
measures ( atlest 4 tools)

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )

Finding the digital evidences for planning for


mass shooting using Disk Forensics. (Data will
be provided).

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies
Building a Ransomware Simulator: Design , build
& encrypts a test file and displays a ransom
message on VM.
Finding the digital evidences for planning for
mass shooting using Disk Forensics. (Data will
be provided).
Audio forensics to match the suspect voice from
the received sample file from the suspect/victim
device.
Exploring Tools and Websites for Detecting Fake
News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use

Clickjacking Exercise: The Case of the Hidden


Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies
Identify Vulnerable websites by performing
Banner grabbing on it with its Counter measures
( atlest 4 )
Analyzing Phishing Techniques That Bypass
Spam Detection.(Atlest 4 methods)
Grab Digital Foot-printing & its Counter
measures ( atlest 4 tools)
Finding the digital evidences for planning for
mass shooting using Disk Forensics. (Data will
be provided).
Audio forensics to match the suspect voice from
the received sample file from the suspect/victim
device.
Implementation and Detection of Ransomware
Attacks

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies
Analyzing Phishing Techniques That Bypass
Spam Detection.(Atlest 4 methods)
Grab Digital Foot-printing & its Counter
measures ( atlest 4 tools)
Audio forensics to match the suspect voice from
the received sample file from the suspect/victim
device.
Implementation and Detection of Ransomware
Attacks
Exploring Tools and Websites for Detecting Fake
News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts
Building a Ransomware Simulator: Design , build
& encrypts a test file and displays a ransom
message on VM.

Building a Secure Website: Develop website


using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )
Analyzing Phishing Techniques That Bypass
Spam Detection.(Atlest 4 methods)
Grab Digital Foot-printing & its Counter
measures ( atlest 4 tools)
Finding the digital evidences for planning for
mass shooting using Disk Forensics. (Data will
be provided).
Audio forensics to match the suspect voice from
the received sample file from the suspect/victim
device.
Implementation and Detection of Ransomware
Attacks

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use
Clickjacking Exercise: The Case of the Hidden
Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies

Building a Secure Website: Develop website


using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )
Analyzing Phishing Techniques That Bypass
Spam Detection.(Atlest 4 methods)
Audio forensics to match the suspect voice from
the received sample file from the suspect/victim
device.
Implementation and Detection of Ransomware
Attacks
Exploring Tools and Websites for Detecting Fake
News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use
Building a Secure Website: Develop website
using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )
Analyzing Phishing Techniques That Bypass
Spam Detection.(Atlest 4 methods)
Finding the digital evidences for planning for
mass shooting using Disk Forensics. (Data will
be provided).
Audio forensics to match the suspect voice from
the received sample file from the suspect/victim
device.
Implementation and Detection of Ransomware
Attacks
Exploring Tools and Websites for Detecting Fake
News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts
Building a Ransomware Simulator: Design , build
& encrypts a test file and displays a ransom
message on VM.

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use
Clickjacking Exercise: The Case of the Hidden
Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

Building a Secure Website: Develop website


using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)
Analyzing Phishing Techniques That Bypass
Spam Detection.(Atlest 4 methods)
Grab Digital Foot-printing & its Counter
measures ( atlest 4 tools)
Audio forensics to match the suspect voice from
the received sample file from the suspect/victim
device.
Implementation and Detection of Ransomware
Attacks
Exploring Tools and Websites for Detecting Fake
News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts
Building a Ransomware Simulator: Design , build
& encrypts a test file and displays a ransom
message on VM.

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use
Clickjacking Exercise: The Case of the Hidden
Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

Building a Secure Website: Develop website


using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )
Analyzing Phishing Techniques That Bypass
Spam Detection.(Atlest 4 methods)
Grab Digital Foot-printing & its Counter
measures ( atlest 4 tools)
Audio forensics to match the suspect voice from
the received sample file from the suspect/victim
device.
Exploring Tools and Websites for Detecting Fake
News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use
Clickjacking Exercise: The Case of the Hidden
Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies
Finding the digital evidences for planning for
mass shooting using Disk Forensics. (Data will
be provided).
Implementation and Detection of Ransomware
Attacks
Implementation and Detection of Ransomware
Attacks
Building a Secure Website: Develop website
using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Building a Ransomware Simulator: Design , build


& encrypts a test file and displays a ransom
message on VM.

Lateral Movement to Dominate Your Network.


Beyond the Breach: Show How Attackers Use

Finding the digital evidences for planning for


mass shooting using Disk Forensics. (Data will
be provided).
Building a Ransomware Simulator: Design , build
& encrypts a test file and displays a ransom
message on VM.
Exploring Tools and Websites for Detecting Fake
News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts
Building a Ransomware Simulator: Design , build
& encrypts a test file and displays a ransom
message on VM.

Clickjacking Exercise: The Case of the Hidden


Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

Building a Secure Website: Develop website


using best practices for web security.( Use
secure coding principles, user authentication,
and session management.)

Identify Vulnerable websites by performing


Banner grabbing on it with its Counter measures
( atlest 4 )
Finding the digital evidences for planning for
mass shooting using Disk Forensics. (Data will
be provided).
Clickjacking Exercise: The Case of the Hidden
Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies
Exploring Tools and Websites for Detecting Fake
News, Fake Emails, Fake WhatsApp Messages,
and Fake Social Media Posts
Grab Digital Foot-printing & its Counter
measures ( atlest 4 tools)
Building a Ransomware Simulator: Design , build
& encrypts a test file and displays a ransom
message on VM.

Clickjacking Exercise: The Case of the Hidden


Like Button - Teams explore the concept of
clickjacking attacks and their potential use in
conjunction with weak HTTPS implementations.
Strategies for preventing clickjacking attacks.

File upload vulnerabilities - Identification &


Exploitation & recommend potential mitigation
strategies
Number Name
9.188E+11 Parab Satyaranjan Munda Prateek
9.188E+11 Rahul Khamkar Batch 8 Varun
9.175E+11 Unknown
9.194E+11 Unknown
9.198E+11 Unknown

You might also like