Details
The 1 Day Workshop on Ethical Hacking at IIT Roorkee is an engaging and comprehensive introduction to the principles and practices of cybersecurity and ethical hacking. Designed for a diverse audience, including students, IT professionals, and enthusiasts keen on understanding cyber threats, this workshop provides a solid foundation in the tactics used by hackers and the strategies to defend against them.
Participants will be immersed in the ethical and technical dimensions of hacking, learning to conduct vulnerability assessments, penetration tests, and employ various defense mechanisms to secure networks and systems. The workshop offers hands-on experience with industry-standard tools such as Kali Linux, Wireshark, and Metasploit, allowing attendees to simulate real-world hacking scenarios in a controlled environment.
Expert instructors will guide participants through the process, from identifying system weaknesses to implementing robust security measures. The workshop not only emphasizes the development of technical skills but also instills an understanding of the ethical considerations in hacking, highlighting the importance of using these skills for lawful and constructive purposes.
This intensive 1 Day Workshop at IIT Roorkee is an excellent opportunity to dive into the world of ethical hacking, providing participants with the knowledge and practical experience to begin their journey in cybersecurity. It's a chance to learn from the best in the field, network with like-minded individuals, and gain insights into a career in one of the most critical sectors in the digital age.
Tentative Workshop Itenary/Topics Covered
Date : 14-Sep-2024
IIT Roorkee
Introduction to the Workshop
- Time: 9:00 AM - 9:30 AM
- Contents:
- Intro of Hacking
- What is hacking?
- Types of hacker
- Black Hat, White Hat, Grey Hat
- About teams Red Team & Blue team
Session 1: Virtualization & Linux And Networking
- Time: 9:30 AM - 10:30 AM
- Contents:
- Virtualization
- What is virtualization ?
- Download Virtual Box or VMware & installation
- Setup and configure (Win,Linux & Mac)
- Networking
- What is LAN,MAN and WAN ?
- What is IP Address?
- IP Address Classes
- What is MAC Address and CAM?
- Router, Switch and Hub?
- Time: 10:30 AM - 10:45 AM
- Time: 10:45 AM - 12:00 PM
- Contents:
- Information Gathering and Scanning
- Information Gathering Intro
- Passive and Active
- Domain name services
- Google Operators and shodan
- What is ports and flags?
- Ports Scanning intro?
- scanning ports using nmap (tool)
- bypass firewall with nmap and hping3 (tools)
- Time: 12:00 PM - 1:00 PM
- Time: 1:00 PM - 2:45 PM
- Contents:
- Wireless Hacking
- Hack wireless network & sniffing
- wifi Hacking
- Packet Sniffing and MITM Short Break
- Malware Threats
- What is Malware and how many types of malware?
- How to make virus and spyware
- Denial of Service
- What is Denial of Service?
- How to perform dos attack?
- How many types of DOS Attacks?
- Social Engineering
- What is Social Engineering?
- How to attacks by using this technique and get information target machine?
- Time: 2:45 PM - 03:00 PM
- Time: 3:00 PM – 4.30 PM
- Contents:
- Hacking Web servers
- Vulnerability Discovery/Scanning
- Vulnerability Scanning Intro
- Vulnerability Scanning Nmap scripting Engine
- Vulnerability Scanning Metasploit
- Exploitation Directory Traversal
- Cracking logging system
- Using Backdoor to Access and FTP server
- Exploitation SQL commands
- Hacking Web Applications
- Intro web application
- What is owasp top 10 ?
- How to find out vulnerable
- What is sql injection
- Perform Attack manual & using sqlmap (tool)
- Cross site scripting (XSS)
- What is XSS?
- Types of XSS
- Perform Attack
- Cryptography
- What is Cryptography?
- Why using Cryptography for communication?
- How many types of Encryption ?
- Time: 4:45 PM - 5:30 PM
- Contents:
- Closing Remarks
- Q&A and Open Discussion: Participants share their experiences, ideas, and questions about what they learned and how they envision applying this in their own fields.
- Networking and Farewell Photography
Short Break
Session 2: Information Gathering/Scanning
Lunch Break and Certificate Distribution
Session 3: Hacking Wireless Networks and Sniffing Malware Threats,DOS, Social Engineering
Short Break
Session 4: Social Engineering, Hacking Web servers, Hacking Web Applications, Cryptography
Closing Session
Note : The Timings quoted above are approximate
Gallery Coming Soon
Others Workshops
Thomso 2024 Prefest Workshop at IIT Roorkee: Unleash AI & Machine Learning Potential in Our Pioneering Artificial Intelligence Workshop!
Digital Marketing Mastry: Learn, Strategize, Succeed at Thomso 2024 Prefest Workshop, IIT Roorkee!
Unlock the power of data! Join our workshop to master data science basics and transform data into decisions. No prior experience needed!
Ethical Hacking: Secure the Future at Thomso 2024 Prefest Workshop at IIT Roorkee on Ethical Hacking
Explore the transformative power of Generative AI with hands-on learning and expert insights into cutting-edge applications.
Explore IoT Innovation with Arduino at IIT Roorkee Workshop - Your Gateway to Smart Technology!
Revolutionize your style with our 'Innovating Fashion Design' workshop – where creativity meets cutting-edge technology!
Explore the skies with us! Learn about drone technology and its vast applications in our interactive workshop. Soar to new heights in innovation!
Create, Play, Innovate: Join our Game Development Fundamentals workshop and start building your own games from scratch today!
Design with the user in mind! Learn the key principles of UX Design in our workshop to create intuitive and impactful digital experiences.
Master the essential steps to turn your innovative ideas into thriving businesses with expert guidance and actionable strategies.
Discover ChatGPT: Simplify Your Daily Tasks and Boost Productivity! Practical Tips for Daily Applications.