About Ethical Hacking

Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks.

What constitutes ethical hacking?

For hacking to be deemed ethical, the hacker must obey the following rules:

  1. Expressed (often written) permission to probe the network and attempt to identify potential security risks.
  2. You respect the individual’s or company’s privacy.
  3. You close out your work, not leaving anything open for you or someone else to exploit at a later time.
  4. You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware, if not already known by the company.

The term “ethical hacker” has received criticism at times from people who say that there is no such thing as an “ethical” hacker. Hacking is hacking, no matter how you look at it and those who do the hacking are commonly referred to as computer criminals or cyber criminals. However, the work that ethical hackers do for organizations has helped improve system security and can be said to be quite effective and successful. Individuals interested in becoming an ethical hacker can work towards a certification to become a Certified Ethical Hacker, or CEH. This certification is provided by the International Council of E-Commerce Consultants (EC-Council). The exam itself costs about $500 to take and consists of 125 multiple-choice questions in version 8 of the test (version 7 consisted of 150 multiple-choice questions).

Modules covered during Workshop

Day 1 (Session 1)

 Ethics and Hacking

  • Hacking History- How It All Began
  • Need For Ethical Hacking
  • Why We Require Ethical Hackers
  • Types Of Hackers
  • Steps In Ethical Hacking
  • Scopes In Hacking

Day 1 (Session 2)

Attacks VS Threats

  • What is a threat?
  • What is an attack?

Passive Attacks

  • Information gathering
  • Web Server fingerprinting
  • HTTP methods testing
  • Application entry points

Active Attacks

  • Privilege escalation
  • Improper error handling
  • Broken authentication
  • Input injection
  • XSS attack

Day 2 (Session 3)

 Man in the Middle Attack (MITM)

  • What is Backtrack Linux?
  • What is Man-in-the-middle attack?
  • Preparation for Man-in-the-middle attack
  • Setting up Wireshark
  • Identifying victim
  • Countermeasures against MITM attack (Demo)

 Phishing, Trojan, Worms and Viruses

  • What is phishing?
  • Preparation for phishing
  • Introduction to the concepts of Trojans, worms and viruses

Day 2 (Session 4)

 Email Forging and Cyber Laws

  • What is Email Forging?
  • How to generate a Fake Mail?
  • How to detect a fake Email?
  • Introduction to cyber laws
  • IT Acts, Rules and Regulation

Requirements

  1. Laptop/Computer per two students is necessary.

 Workshop Highlights

  1. Receive an unparalleled education from experts from Industry.
  2. Interactive Technical session, Query session, Live demos on Ethical Hacking and Cyber Forensics, and PowerPoint presentations.
  3. Learn and interact with Certified Professionals.
  4. Improve student’s job prospects and get an edge over their counterparts in IT Field is the backbone of any other industry.

Registration Fee

Will be provided on request. The fee includes workshop training, and event registration