15 Days

CYBRE SECURITY SUMMER TRAINING PROGRAM
Increased Internet penetration has given exponential rise in sophisticated attacks on Information
Technology (IT) infrastructure. Attackers are gaining access to sensitive information like
CREAD CADR details and other financial information. In this summer training you get the
explorer how to check this.
Introduction to Ethical Hacking
 Hacking Concepts 

Hacking vs. Ethical Hacking 

Effects of Hacking on Business 

Who Is a Hacker? 

Hacker Classes 

Hacktivism 
 Hacking Phases 
 Types of Attacks 

Types of Attacks on a System 

Operating System Attacks 

Information Gathering
 Footprinting 

Footprinting Concepts 

What is Footprinting? 

Why Footprinting? 

Objectives of Footprinting 
 Reconnaissance 

Reconnaissance Concepts 

WHOIS Lookup 

Introduction to Linux/Kali Linux/Backtrack
 Introduction 
 Basic Commands 
 Exploit Tools 
System Hacking
 System Hacking: Goals 
 Password Cracking 
 Password Complexity 
 Password Cracking Techniques 
 Types of Password Attacks 

Phishing
Steganography
 Image Hiding 

Data Hiding 

Social Engineering Attack
 What is Social Engineering? 
 How can it be used? 
 Types Of Social Engineering 

DOS ATTACK
Fake Emails
Session Hijacking
 Session Hijacking Concepts 
 Brute Forcing Attack 
 Man-in-the-Middle Atta 

SQL Injection
 What is SQL injection 
 Exploiting the weakness of server 
 SQL Injection Scripts 

Hacking Webservers
 Webserver Concepts 
 Webserver Attacks 
 Webserver Attack Tools 
Buffer Overflow
 Buffer Overflow Concept 
 Introduction to Metasploit 
 How to Buffer Overflow With Metasploit 
PROJECTS

Live demonstration of Google dorks. 

Magic of 94FBR 

Hacking through command prompt. 

Hacking through a live booting. 

Creation of free domain 

Facebook account hacking on local server. 

Gmail account hacking on local server. 

Facebook account hacking on real server. 

Gmail account hacking on real server. 

Hide a text file in an image file. 

Hide a text file in a audio/video file. 

Hide executable file in an image file. 

A scenario showing social engineering attack 

DOS ATTACK on a weak website. 

Sending a fake email 

Creation of a virus to automatically shutdown the computer. 

Shutdown the laptop by sending an email. 

Creation of virtual environment for session hijacking. 

Sniffing of username and password from a virtual network. 

Preparation of MySql database & executing SQL commands. 

SQL Injection to hack a website 
TOOL KIT
 CD( Softwares and Tools)