Вы находитесь на странице: 1из 7


Detailed Module
Loophole with Ethical Hacking and Penetration Testing
ISMS with Concept of Hacking
Duration: 30 minutes
Lecture and Demonstration: 15 Hours (based on GT101: Foundation of Information Security)
Security Challenge: 01 Hours
Elements of Information Security
Introduction • Information Security Supports the Mission of the Organization
• Information Security Should Be Cost-Effective
Security can't be guaranteed. As Clint Eastwood once said, "If you want a • Responsibilities and Accountability Should Be Made Explicit
guarantee, buy a toaster." The only secure system is one that's unplugged, • Owners Have Security Responsibilities Outside Organizations
turned off, and in a locked room.
Roles and Responsibilities
As it's not practical to leave our systems turned off, we need to understand • Senior Management
the risks to our systems and prepare ourselves to defend them. Preparation • Program and Functional Managers/Application Owners
begins with understanding — and that's where awareness comes in. • Users
With all the news stories about hackers, botnets, and breaches involving Common Threats: A Brief Overview
personal information, it's easy for the security message to sound over-used • Fraud and Theft
and tired. It's easy for people to say, "It won't happen here." Yet, studies
• Employee Sabotage
and surveys repeatedly show that: the human factor (what employees do or
• Loss of Physical and Infrastructure Support
don't do) is the biggest threat to information systems and assets.
• Threats to Personal Privacy
The best way to achieve a significant and lasting improvement in
Indian Cyber Law
information security is not by throwing more technical solutions at the
problem — it's by raising awareness and training and educating everyone Duration: 30 minutes
who interacts with computer networks, systems, and information. (based on GT115: Getting Familiar with Indian Cyber Law)
Module Structure Information Technology Act 2000-2008
• Introduction to IT Act 2000
Loophole, Ethical Hacking and Penetration Testing workshop, aims to • Amendment 2008
educate users of digital media of the threats, risks and privacy concerns that • Under Umbrella of IT Act 2000
go with using them. The other goal of this training module is to expose Cyber Crimes
issues and vulnerabilities to drive the digital media industry to create Intellectual Property
solutions to these problems. Data Protection and Property
• Limitations of Indian IT Act

Kyrion Technologies Pvt. Ltd. www.kyrion.in

Web Application Penetration Testing • Where to include Data Validation
Duration: 120 minutes • Prevent Parameter Tampering
o Hidden Fields
(based on SE118: Essentials of Web Application Penetration Testing) • Encoded Strings
Introduction to Penetration Testing o HTML and URL Encoding
• Legal and Ethical Implications o Delimiter and Special Characters
• Types of Penetration Testing
Session Management
o White Box Penetration Testing
o Black Box Penetration Testing • Session ID Generation
o Grey Box Penetration Testing • Session Handling
o Regeneration of Session Tokens
Setting Up Web Application Penetration Testing Lab o Session Validation
• Collecting and Installing PenTest Tools o Session Bruteforcing
• Flexible Browser with Security Add-ons • Session Termination
• Setting up Browser Proxies
Hacking Emails and Social Networks
Beginning Application Penetration Testing Duration: 90 minutes
• Identification of Application Entry Points
o Get and Post Parameters
(based on GT102: An Eye Opener to Cyber Social Media Security)
• Testing for Security Vulnerabilities Cyber Social Media Threats
o SQL Injection • Social Engineering
o Cross Site Scripting o Human Based Social Engineering
o Session Hijacking o Computer Based Social Engineering
o Local and Remote File Inclusion Attacks • Fake Emails
o Parameter Tampering • Keystroke Loggers
• Phishing
Basics of Secure Programming • Identity Theft
Duration: 30 minutes
Securing Your Cyber Social Life
(based on GT122: Secure Coding Practices\ for Applications) • Awareness is the Key
Use Cryptography for Application Security • Email Security
• Hashes o Detecting Fake Emails
• Secure Key Storage o Creating Account Filters
• Weak Practices in Cryptography • Online Account Security
o Strong Password Setup
Data Validation Strategies o Designing Account Recovery Mechanism

Kyrion Technologies Pvt. Ltd. www.kyrion.in

o Secure Logout Recovering Techniques
o Browser Remember Password • Corrupt Partitions
• Recognizing Phishing Websites • Corrupt File System
• Media Errors
Google Hacking • Overwritten Damage
Duration: 30 minutes
Data Acquisition
(based on GT121: Google Best Friend of a Hacker) • OS Volume Information
Working of Google and its methodology • Disk Imaging
• Introduction to Crawlers, Bots
• Caching Process of Crawlers World of Digital Virtualization
Duration: 30 minutes
Various Roles of Google as a Friend of Hacker (based on GT105: Concepts of Computer Virtualization)
• Advance Google Search Operators
• Directory Traversal Tool Introduction to Virtual Machines and Virtualization
o Finding Directory Listings • Concept of Virtualization
o Locating Specific Directories • Need and Advantages of Virtualization
• Vulnerable Website Locator
o Locating via Company Tags Installation and Configuration
o Locating via Web Applications • Hardware and Software Requirements
o Locating via Common Names • Installation and Configuration
• Performance Optimization
Various Attacks with the help of Google o CPU & Memory Performance
• Password Harvesting o Network Performance Optimization
• Controlling CCTV Camera • Host to Host Networking
• Host to LAN Networking
Data Security and Recovery o Storage Performance
Duration: 60 minutes
Hacking and Securing Windows Systems
(based on GT117 - Data Recovery and Backup)
Duration: 120 minutes
Data Security with Cryptography
(based on GT108: Beginning with Windows Security)
• Securing Data by Using EFS and BitLocker
• File and Folder Permissions Introduction to Windows Security
• Alternate Data Streams • Overview of Windows OS
• Encrypting Office Documents • Windows File System
• Security Architecture in Windows

Kyrion Technologies Pvt. Ltd. www.kyrion.in

o Local Security Authority
o Security Account Manager Virus and Worm: Infectious Malware
o Security Reference Monitor • Significance of Virus and Worm
• Behavioral Activity of Virus and Worm
User Account Security • Virus and Worm Development
• Password Attacks in Windows o By Automated Tools
o Bruteforcing, Dictionary and Rainbow Table Attacks o Coding own Viruses and Worms
• Account Security Strengthening
o Strong Password Policy Trojan Horse: Concealment
o Additional Security: Syskey Encryption • Overview of Trojan
o User Account Control : Parental Controls • Trojan Attack
o Restricting BIOS Setup o Direct Connection
o Reverse Connection
Services, Port and Protocol Security • Injection in System Files
• Auditing and Monitoring Network Connections
• Restricting Ports, Protocols and Services Detection and Removal
• Windows Firewall with Advance Restrictions • Anti Malware Tools
• Manual Removal of Malwares
Security Applications in Windows
• Auditing and Monitoring Windows Auto Startup Software Cracking: Product Key Generation
• Defending Windows via Windows Defender
• Policy Management with MBSA Duration: 60 minutes
• File and Folder Scanning with MSSE (based on GT111: Application Reverse Engineering)
Introduction to Assembly Language
Malware: Attack, Detect and Defend • Role of Assembly Language in Reverse Engineering
Duration: 90 Minutes • Concept of Debuggers and Dis-assemblers
(based on GT110: Computer Malware: Detection and Defense)
Understanding Data Flow
Introduction to Computer Malware • “Step Over” view of Data flow
• Overview Malware: Malicious Software • “Step Into” view of Data flow
• Proliferation and Purposes
• Types of Malware Principles of Software Security
o Virus: Vital Information Resources Under Seize • Encryption
o Worm: Write Once Read Multiple • Online Key Checking
o Trojan Horse, Rootkit • Fake Checking Points
o Spyware, Keystroke Logger • DLL Breakpoints

Kyrion Technologies Pvt. Ltd. www.kyrion.in

Mini Chakravyuh – Security Challenge Mobile Hacking Techniques and Security Concepts
Duration: 60 minutes Duration: 30 minutes
(based on Password Cracking and Product Key Generation) (based on GT116: Vulnerabilities in Mobile & VOIP Security)
Requirements Attacks for Faking Caller ID
• Computer Device (Bring Your Own Device) • via Softphones
• Windows Operation System • via Websites
• Working CD/DVD Drive
• Removable Storage Media (Pen Drives 1GB) Attacks for SMS Technology
• Battery Backup for 60 minutes • Faking Sender ID: Fake SMS
• Faking Sender ID: Fake MMS
Challengers will be asked to install Virtual PC in their machines so that they
can use the challenge machine. Mobile Security Kit
• Anti Virus
Level 1: Windows Password Cracking • Key Guard
• Secure Password Setup
Windows virtual machine will be password protected. Challengers will be • Threats Posted by Third Party Applications
required to recover the password of the administration user account using
the password cracking techniques demonstrated during the workshop.

Level 2: Product Key Generation

Windows virtual machine will carry a software setup. Challengers will be

required to generate a valid product key against their name.

Target application will be with the Loophole Software Toolkit


Winners will be required to demonstrate the solution of both the levels to all
the participants of the workshop to declare their win.

Kyrion Technologies Pvt. Ltd. www.kyrion.in

Kyrion Technologies Pvt. Ltd.
Add: 1009, Indra Prakash Building, Barakhamba Road, Connaught Place, New Delhi 110001, India
Tel: +91-11-4355-9494 Email: workshop@kyrion.in Web: www.kyrion.in