Ceh,learn Ethical Hacking,hacking Workshop,learn Hacking.
We are Ec- Council Authorized training Partner; The International Council of E-Commerce
Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and information security skills. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many others programs, that are offered in over 60 countries through a training network of more than 450 training partners globally.
Ec-council received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). And the United States Department of Defense has included the CEH program into its Directive 8570, making it as one of the mandatory standards to be achieved by Computer Network Defenders Service Providers (CND-SP)
Term & Conditions:
Jodo Institute responsibility: Impart training on workshop and Guide the students for future in Security.
College management/organizer: Requirements for workshop:
Seminar Hall
Two cordless Mikes
2 LCD projectors
Internet Connection
2 Volunteers
Accommodation for two Security Consultants in College.
Workshop Duration:
16 hours (2 Days)
Workshop Curriculum:
PART I Ethics
Why is Security needed?
What is ethical hacking?
Ethical Hacker vs Malicious Hacker
Types of Hackers
Building an approach for ethical hacking
PART II Google Hacking
What is Google?
How does Google work?
Google Tricks
Basic Hacks
Google Calculator
GoogleNews
Google Tools
How can Google hacking help an ethical hacker?
.Preventing Google Crawls
Practical Class: Case Studies
PART III Scanning
What is Scanning?
Objectives of Scanning
Practical Class
Scanning Tools to be used:
Nmap
Null Scan
Firewalk
XMAS Scan
NIKTO
GFI Languard
PART IV Email Hacking
How does Email work?
Tracing an Email
Spam
What is Spamming?
Methods of Prevention
Laws about Spamming
Fake Emails
Detecting Fake Emails
Tracing Server variables through
Part V Trojans
Definition
Legend
Difference b/w Trojan, virus and worms
Working of Trojans
Server, Client, Direct & Reverse connections
Trojan Practical
Beast, Bandook etc.
Both direct and reverse connection
Trojans on WAN
Problems Dynamic IP
NAT
Using netcat as a Trojan
Antivirus Detection process
Heuristics, signatures
Hex editing, source code changes, custom, binders, packers, DLL injection
Social Engineering Deploying Trojans
Manual Detection
TCP-view, process monitors
Part VI Session Hijacking
Understanding Sessions
Passive vs. Active session hijack
TCP sessions and HTTP sessions
TCP session hijacking Telnet
Stealing Cookies to Hijack Session ID -XSS
Part VII PHP Injection
Understanding Sever side scripting
Using code-injection to escalate privileges
Briefings on PHP, ASP etc.
Coding PHP shell
Using PHP shells
Exploiting file upload vulnerability
PHP vulnerable functions and safe mode
Prevention of code injection
Part VIII SQL Injection
Defining SQL
Understanding web application
Using SQL to login via middleware language
Checking SQL Injection vulnerability
URL and forms
SQL query SELECT, DROP etc.
SQL cheat sheets
Using source changes to bypass client side validation
PHP magic quotes
Using SQL injection tools
Importance of Server side validation
Part IX Sniffing
Introduction
Active, Passive
DNS, ARP
Tools
Wireshark, Ettercap Cain n Abel
Detecting Sniffing
DNS Poisoning
Router Hacking
Emulating WAN sniffing
Part X Bluetooth Hacking
Bluetooth Introduction
Security Issues
Security Attacks
Bluejacking
Tools for Bluejacking
Tools for Bluejacking
BlueSpam
Blue snarfing
BlueBug Attack
Short Pairing Code Attacks
Man-In-Middle Attacks
OnLine PIN Cracking Attack
BTKeylogging attack
BTVoiceBugging attack
Blueprinting
Bluesmacking -The Ping of Death
Denial-of-Service Attack
BlueDump Attack
Part XICryptography
Introduction to Cryptography
ClassicalCryptographic Techniques -Encryption/Decryption
Cryptographic Algorithms
RSA (Rivest Shamir Adleman)
Example of RSA Algorithm
-RSA Attacks
-RSA Challenge
Data Encryption Standard (DES)
DES Overview
RC4, RC5, RC6, Blowfish
One-way Bash Functions -MD5
SHA (Secure Hash Algorithm)
SSL (Secure Sockets Layer)
What is SSH?
SSH (Secure Shell)
Algorithms and Security
Disk Encryption
Government Access to Keys (GAK)
Code Breaking: Methodologies
Cryptanalysis
Cryptography Attacks
vBrute-Force Attack
Cracking S/MIME Encryption Using Idle CPU Time
Use Of Cryptography
Part XIISocial Networking Sites & Hacking
Impersonating Orkut, Facebook, MySpace
Orkut
Impersonating on Orkut
MW.Orc worm
Facebook
Impersonating onFacebook
MySpace
Impersonating on MySpace
How to Steal Identity
Comparison
Original
Identity Theft
http://www.consumer.gov/idtheft/
Part XIII: Malicious Hacking
Yahoo booters
Crawlers
Remote File Inclusion
Local File Inclusion
Backdoor Shells
Trojan Writing in C, C++
PHP Injection
by: Mohit Yadav --JODO INSTITUTE ---9891773445
Hacking Workshop,learn Hacking, Ceh,learn Ethical Hacking No More Blemish Face - Learn How You Can Get rid of Your Scary Face Mcse 70-291 Exam Nowaday Easy Scholarships For College - An Easy Way to Get Scholarship Money For Free In the Bible versus the Quran: He Learned to Hunt; He Ate People Distance Learning: Is It Really Appropriate For You? How To Learn Simple php Learning The Consequences Of The Various Eating Disorders Money To Help You Go To College: Obama Grants Effective Leadership Skills - Leaders Learn Best on the Job If You Want More GACE Test Points, Just Bust GACE Study Guide Myths! TExES Exam Takers React to Shocking TExES Exam Study Guide Report Why Not Try Learning To Kitesurf?
Ceh,learn Ethical Hacking,hacking Workshop,learn Hacking. Anaheim