EISystems™ is an Indian entity, which is exploring indefinitely in the innovative world of technology services and as a technology education provider.It was conceptualized with a motive to spread the magic of technology among this society of living beings who are now somewhere seeing their dependence on technology. We have a prominent base in various diversified service based sectors, which include Robotics, Forensics Sciences, Internet Consulting, Industrial Automation, Information Security and lot of innovative fields through our various business verticals.
The primary reason behind conducting the workshop is to give a live demonstration of different Cyber Attacks,Hands on Practice on Web Application Assessment and Penetration Testing,Cyber Crime Investigations and explain how security analysts and cyber crime investigators use techniques to solve these vulnerabilities and organized crimes.
Its a two day workshop on 1st & 2nd of November from 9:30 am to 5pm.
SESSION 1 :
Why is security needed?
What is ethical hacking?
Ethical Hacker Vs Malicious hacker
Types of Hackers
Building an approach for ethical hacking
Steps in Ethical hacking
Networking & Hacking
What is a Network?
Types of network – LANs, WANs & WLANs
What is Internet?
What is a Server?
What is an IP Address?
What is a domain name?
Client-Server Relationship Model
Internet networking - What is a port?
Whois access (Demo)
Ip scaning (Demo)
Port scaning (Demo) and Network scaning & its tools (Demo)
What is Google and how does it work? and Google tricks (Demo)
Basic hacks (Demo) - How can Google hacking help an Ethical Hacker? (Demo)
Accesing online remote cameras
SESSION 2 :
Windows security (Demo)
Port & Services (Demo)
Introduction of SQL
What is SQL injection
Checking SQL injection vulnerability (demo)
Basic strategy of SQL injection (Demo)
Getting login credientials using SQL injections (Live Demo)
Using SQL to login via middleware language (Demo)
URL and Forms (Demo)
SQL Query SELECT, DROP etc. (Demo)
SQL cheat sheets (Demo)
Using source changes to bypass client side validation (Demo)
Live demonstration of the attack (Demo)
Using SQL injection tools (Demo)
Importance of server side validation (Demo)
How to protect your system from SQL Injections (Demo)
What is phishing?
Social engineering used in phishing (Demo)
Phishing attack (Demo)
Phishing sites (Demo)
Protection against phishing (Demo)
Viruses: Trojans, Worms, Malware, Spyware
Modes of spreading
Different Ways a Trojan can Get into a System (Demo)
Creation of Trojan using cybergate (Demo)
Attacking a system using our created trojan (Demo)
Indications of a Trojan Attack (Demo)
Some Famous Trojans and Ports They Use (Demo)
How to Detect Trojans? (Demo)
How to Determine which Ports are Listening (Demo)
SESSION 3 :
What are cookies? (Demo)
Reading and writing cookies (Demo)
Passive Vs Active session hijack (demo)
TCP sessions and HTTP sessions (Demo)
TCP session hijacking: Telnet (Demo)
Stealing Cookies to hijack session using: XSS (Demo)
Spoofing Vs Hijacking
Types of Hijacking
Protection against session Hijacking (Demo)
Overview of Social Engineering
Case Study - Example of Social Engineering Attack
Java Applet Attack (Demo)
What is Fake SMS & Call?
Method of generating fake SMS & Calls (Demo)
Actions to be taken for fake SMS and Calls (Demo) Indian IT Act & Cybercrime
IT ACT 2000
Cyber crime/terrorism and its type
Sections in the Indian constitution Sec. 65, 66 A,B,C, D , 67, 69 etc.
Penalty in all sections of Indian constitution
SESSION 4 :
What is DNS Spoofing?
How does it work?
How to secure yourself?
DNS Spoofing (Demo)
How does an email work?
Tracing an email (Demo) - Spam
Detecting fake emails (Demo)
What is a firewall? & How can it help you
How a firewall works
What are key loggers? (Demo)
Types of key loggers? (Demo)
Venue Name : NIT Warangal