Вы находитесь на странице: 1из 5

THE BACKTRACK

By Hitesh Choudhary

Two Days training Workshop on Information Security


Workshop Sessions Schedule:

Day - 1

Information Security

Cyber Ethics
Introduction
Types Of Hacker
Importance of Vulnerability research
Vulnerability Research References

Information Gathering & Scanning Methodologies


Securing information from hackers on internet
Information gathering of websites & networks
Scanning Ports, Network, Vulnerability & Structure
of Websites
Securing Admin Panel of websites 0.5

Trojans, Backdoors
Types of Trojan
Famous Trojans
Binding Trojans with another file
Undetection process of Trojans from antivirus
How to detect Trojan and backdoor
Removal of Trojans from your computer
Analysis of Trojans and Viruses

Google Advance Search


Using Google for Penetration
Advanced operators of Google
Finding Vulnerable in websites via Google
Finding vulnerable networks via Google
Web cam vulnerability via Google
Sensitive Files vulnerability via Google

Proxy Server Technology & Virtual Private Network


What is proxy?
Use of proxy

0.5

Open block website by proxy


Online manual proxies
Online web based proxies
Introduction to VPN
Installing VPN
Tor
Ultrasurf
Hot spot shield

Email Security
Understanding Emails
Tracing an email
Fake mailers
Mail bombing
Spam or suspicious emails0.5

Phishing and Countermeasures


Introduction of phishing
Understanding the phishing
Technique of Phishing
Gmail ,facebook, yahoo, orkut phishing 0.5
Website Security

Web Application Security


Web Application Overview
Web Application Threats
OWASP Top 10 Vulnerabilities
Detecting Trojans on websites
SQL injection
How to Mine all Column Names of a Table
How to Retrieve any Data
How to Update/Insert Data into Database
SQL Injection Automated Tools
Blind SQL Injection
Preventing SQL Injection Attacks
XSS attacks and preventions
Finding & Fixing XSS in websites
Local File inclusion
Remote file inclusion
20 Hands on Demonstrations on real websites 2.0
Steganagraphy & cryptography
Introduction to Steganagraphy

Use of Steganagraphy
Securing the data
Key loggers and spy wares
Introduction to key loggers
Installing the key loggers
Steeling password using key logger
Countermeasures

Mobile & VoIP Security


SMS & SMSC Introduction
VOIP call forging
SMS forging & countermeasures
Sending & Tracking fake SMSes 0.5

System & Network Security


Securing Administrators password
Enumeration of networks
Securing network data from sniffers

Wireless Security
Wireless Protocols
Wireless Routers-Working
Securing Wireless Routers from hackers(WEP)
Countermeasures
Cyber Crime Investigation

10

Introduction to Cyber Crime Investigation


Types of Cyber Crimes
Report Cyber Crimes

11

Investigation Methodologies
Different Logging Systems
Investigating Emails ( Email Tracing)
Investigating Phishing Cases
Investigating Data Theft Cases
Investigating Facebook Profile Impersonation Cases
Cyber Law & IT Act,2000
1.0

For the very first time, in India, we present a special 1 day learning
program of penetration testing on BACKTRACK. Special Attraction
BARCODE hacking.

Day - 2 BACKTRACK operating system


Modules

Particulars

Duration (hours)

Introduction to BACKTRACK
What is BACKTRACK
What so special about it
Why BACKTRACK is HACKERs choice 0.5

Installing BACKTRACK
Live cd mode
Live pendrive mode
Installation to hard disk
Problems regarding installation
Countermeasures 1.0
General command introduction
Login
Ubuntu commands
Starting up of network
0.5

Knowing your tools


DNS hijacking
Introduction to maltego
Vulnerability scanner-mantra
Wi-Fi cracking
Network scanners-zenmap
Metasploit Framework
Setting up payload
Exploiting windows xp
Exploiting windows 7
Exploiting fedora 14 1

Note: These are just the major aspects that we will be discussing,
each point will be elaborated in detail with demonstrations of the
tools and techniques.

Program Benefits & Highlights:

Learn & Interact with renowned Industry Experts

Receive an unparalleled education on the art of computer security


with personal one-on-one attention.


Hands on Demonstrations of Latest Hacking Techniques & Tools.

Hands on Demonstrations of various cyber cases

PowerPoint Presentation, Live Demos, Interactive Question


Answer sessions and comprehensive reading material.

&

Workshop Trainer:

Mr. Hitesh Choudhary


Contact-+91 8003747654
Course Material & CDs:

Comprehensive course material will be provided to participants.

Ethical Hacking Toolkit worth Rs.300 (Containing Tools, Videos,


EBooks, Presentations)
Duration:

2 Days (5-6 hours/day)


Fees:

Rs. 700/- per student.


(This includes Registration Kit and Course Material).
Certification:
Every individual participant will be awarded by participation certificate and winners
will be awarded by prize money and excellence certification.

Вам также может понравиться