Ethical Hacking Workshop


Certificate of Excellence from Elan & nVision, IIT Hyderabad & Robotech Labs



The Ethical Hacking Workshop has been designed for the students regardless of their background.

The workshop helps the students to know about Ethical Hacking and Information security thereby giving them knowledge about Reading the
Hacker’s mind and Understanding the hacking psychology and methodology, Bluetooth Hacking ,Google Hacking, Scanning , Sniffing Email hacking , System
hacking, Trojans, network applications, web server as a target and wireless hacking and lots more with proper demonstrations and practical work .

The workshop would be conducted by faculty having International Level Expertise in the field of Information Security and Ethical Hacking.

PART I – Ethics

• Why is Security needed?
• What is ethical hacking?
• Ethical Hacker vs Malicious Hacker
• Types of Hackers
• Building an approach for ethical hacking

PART II – Google Hacking

• What is Google?
• How does Google work?
• Google Tricks
• Basic Hacks
• Google Tools
• How can Google hacking help an ethical hacker?
• Preventing Google Crawls

PART III – Scanning

• What is Scanning?
• Objectives of Scanning
• Scanning Tools to be used:
• Nmap
• Null Scan
• Firewalk
• XMAS Scan
• GFI Languard

PART IV – Email Hacking

• How does Email work?
• Tracing an Email
• Spam
• What is Spamming?
• Methods of Prevention
• Laws about Spamming
• Fake Emails
• Detecting Fake Emails
• Tracing Server variables

Part V – Trojans

• Definition
• Legend
• Difference b/w Trojan, virus and worms
• Working of Trojans
• Server, Client, Direct & Reverse connections
• Trojans on WAN
• Problems – Dynamic IP
• Using netcat as a Trojan
• Antivirus Detection process
• Social Engineering – Deploying Trojans
• Manual Detection

Part VI – Session Hijacking

• Understanding Sessions
• Passive vs. Active session hijack
• TCP sessions and HTTP sessions
• TCP session hijacking – Telnet
• Stealing Cookies to Hijack Session ID – XSS

Part VII – PHP Injection

• Understanding Sever side scripting
• Using code-injection to escalate privileges
• Briefings on PHP, ASP etc.
• Coding PHP shell
• Using PHP shells
• Exploiting file upload vulnerability
• PHP vulnerable functions and safe mode
• Prevention of code injection

Part VIII – SQL Injection

• Defining SQL
• Understanding web application
• Using SQL to login via middleware language
• Checking SQL Injection vulnerability
• URL and forms
• SQL query SELECT, DROP etc.
• SQL cheat sheets
• Using source changes to bypass client side validation
• PHP magic quotes
• Using SQL injection tools
• Importance of Server side validation

Part IX – Sniffing

• Introduction
• Active, Passive
• Tools
• Wireshark, Ettercap Cain n Abel
• Detecting Sniffing
• DNS Poisoning
• Router Hacking
• Emulating WAN sniffing

Part X – Broadband Hacking

• Introduction: Broadband
• Using Default Passwords
• Special Trick: Hack any MTNL/BSNL/Airtel Broadband!
• Using Support Administrator Login
• Exploiting the Router
• Poisoning the Router
• Controlling User’s Internet Access
• Getting to the System from the Router

Part XI – Cryptography

• Introduction to Cryptography
• Classical Cryptographic Techniques – Encryption/Decryption
• Cryptographic Algorithms
• RSA (Rivest Shamir Adleman)
• Data Encryption Standard (DES)
• One-way Bash Functions – MD5
• SHA (Secure Hash Algorithm)
• SSL (Secure Sockets Layer)
• What is SSH?
• SSH (Secure Shell)
• Cryptography Attacks
vBrute-Force Attack
• Cracking S/MIME Encryption Using Idle CPU Time

Part XII – Social Networking Sites & Hacking

• Impersonating Facebook
• MW.Orc worm
• Impersonating on Facebook
• How to Steal Identity
• Comparison
• Original
• Identity Theft



The Charges includes:

  • Handouts and training material
  • Certificate of Excellence from Elan & nVision, IIT Hyderabad & Robotech Labs


  • Certificate of Excellence from Elan & nVision, IIT Hyderabad & Robotech Labs


  • Do we need to carry laptop along with us?

Its better if you can carry your laptop with you , if not then you can share with your friends if coming in a group or with fellow workshop participants.

  • Where to report ? When to report? 

You will get the details of exact workshop venue inside the campus a day before the workshop. You can reach at 8.30 AM at the campus/venue.

If you have opted for accommodation then please follow accommodation rules and timings.

Accommodation & Tranportation Details:

You can check the details and FAQ : Click Here


Campus Ambassador

Click here to become the Campus Ambassador & Earn.

To Organize this workshop in your college Click here & Fill the form.

9540 93 2700

Event Schedule

12-13 November 2022 at IIT Hyderabad


Duration: 2 Days (8 Hour per day)

Venue: IIT Hyderabad

No. of Team Members: 1

Free SDK Kit to every Individual

**Limited number of seats

**If the Workshop gets cancelled, all the participants will be given full refund.

You may also like…