Ethical Hacking

What is this course about?

Ethical Hacking Workshop mainly focuses on the students eager to be a White Hat Hacker. It features a brief introduction to the world of hacking starting with the importance of ethical hackers and their need in today’s world scenario, including to the basics of networking that will help you have a deep understanding of the working of internet.

Later, windows hacking using various methods will be introduced and in the module of stenography you will learn how to hide files in other files in order to protect sensitive data. After the end of the aforementioned module you will be learning phishing in which you will be taught How to hack Facebook Accounts and Gmail Accounts and thus how to avoid it.

In the end you will gain knowledge about the basics of Backtrack 5 and the concept of man in the middle attack (MITM ATTACK).

Highlights of workshop

  • Certificate of IIT Kanpur .
  • Certificate of Participation to all Zonal participants
  • Certificate of Merit to all Zonal Winners
  • Enhance your Knowledge through various Live Projects
  • Straight Entry into Final Round of National Level Robotics Championship
  • Chance to represent yourself in IIT (Indian Institute of Technology)
Ethical hacking
Day 1 (Session 1)
 Ethics and Hacking
Hacking History- How It All Began
Need For Ethical Hacking
Why We Require Ethical Hackers
Types Of Hackers
Steps In Ethical Hacking
Scopes In Hacking
Windows Hacking
To exploit the vulnerabilities of windows using live devices and Universal Serial Bus (USB).
Steganography
What is Steganography?
Hiding data behind Images, PDFs, Audio and Videos files
Day 1 (Session 2)
Basics Of Internet, Networking And Hacking
What is a Network?
Types of network – LANs, WANs & WLANs
What is Internet?
Basic Structure
What is a Server?
What is an IP Address?
What is a domain name?
IP-Domain Relation
Client-Server Relationship Model
Internet networking
Set up Ad-hoc networks
Basic explanation of exploitation of loopholes
SQL Injection Using DVWA
Introduction of SQL
What are SQL INJECTION and DVWA?
Checking SQL injection vulnerability (Demo)
Basic strategy of SQL injection (Demo)
Getting login credentials using SQL injections (Live Demo)
URL and Forms (Demo)
SQL Query SELECT, DROP etc. (Demo)
SQL cheat sheets (Demo)
Using source changes to bypass client side validation (Demo)
Live demonstration of the attack (Demo)
Using SQL injection tools (Demo)
How to protect your system from attacks
Day 1 (Session 3)
Man In The Middle Attack(MITM)
What is Backtrack Linux?
What is Man-in-the-middle attack?
Preparation for Man-in-the-middle attack (Demo)
Setting Ettercap tool for the attack (Demo)
Identifying victim (Demo)
Countermeasures against MITM attack (Demo)
Phishing, Trojan, Worms And Viruses
What is phishing?
Preparation for phishing
Introduction to the concepts of Trojans, worms and viruses
Day 2 (Session 4)
Zonal Competition
After the hand on theory and practical experience from the workshop, Zonal Round Competition will be conducted for the participants.
Certificate Distribution
On behalf Salty-Art Designs Certificate of Merit will be provided to all Zonal Round Winners and Certificate of Participation will be provided to all the Zonal Round Participants (Excluding Merit Participants).