Sie sind auf Seite 1von 14

------------------------------------------------------------------

Proposal for organizing HackCrack-2015 Zonal Lag (An Ethical


Hacking workshop-cum-competition) at your esteemed institution.
------------------------------------------------------------------
Copyright Eyan Techsol, Noida 2014. All rights reserved.

Date:

The Principal/Dean/Director/HOD,



Sub: Regarding organizing Ethical Hacking Workshop HackCrack-2015 in your
institution.

Dear Sir,

We seek immense pleasure in sending our proposal to your esteemed college for
conducting HackCrack-2015 (An Ethical Hacking competition-cum -workshop).
Eyan Techsol is an IT Sector company. Eyan Techsol provides world-class services and
solutions for numerous human and technical problems, which can ever cause any kind
of internet or cyber security breaching threat. Eyan Techsol is an autonomous center of
excellence in the field of cyber technology and management. Eyan Techsol is inspired by
the guiding principle and vision of educating one and all about the nuances of cyber
crime and the risks involved.
We wish to associate with your institution for conducting HackCrack-2015. Please find
the details about the same overleaf. We seek your valuable co-operation & support and
look forward towards a positive response.
Kindly grant us the permission to finalize your prestigious institute as the zonal center
for HackCrack-2015. We shall be highly thankful.


Hoping for a successful endeavor and many more to come in future!

Warm Regards
Neeraj Batra
Business Head
HackCrack-2015
Eyan Techsol, Noida
Email: neeraj@eyantechsol.com
Phone: +91- 8800256561
+91-9971895094


HackCrack-2015 Event Details
This year Eyan Techsol presents HackCrack-2015, Indias Best-Ethical-Hacker hunt. As a
part of this event we are organizing Zonal Rounds all over India for selecting winners of
the event. We have chosen your college for conducting Zonal Round of HackCrack-2015.
In Each Zonal Round we will be conducting one training session and competition on
Ethical Hacking & Cyber Security. This program aims to groom the students with the
fundamentals of ethical hacking and cyber security. A competition/quiz will be
conducted at the end of this session. Winners of this zonal competition will be
getting a Certificate of Merit by Eyan Techsol along with prize & gift vouchers.

Stages of the event HackCrack-2015

An ethical hacking/cyber security workshop will be held at different locations
pan India. The details of the workshop contents and other related information is
available on Eyan Techsol website.
The workshop fee is included in the Registration Charges.
Hacking Tool Kit will be provided by Eyan Techsol to each and every
participant.
At the end of the workshop one hacking competition/Quiz will be
organized and Winner of that competition will be getting the Certificate of
merit in-association Eyan Techsol along with prize & gift vouchers.
The duration of the workshop will be of 2 days(7-8 hours per day)
The workshop will be delivered by Eyan Techsol, Noida.


Process guidelines

1. We want your association to make this HackCrack-2015 a big success in your
institution.
2. A proper publicity will be done about the event at all India Level.
3. Date of workshop can be finalized through telephonic conversation with Coordinators
of HackCrack-2015, and Eyan Techsol, according to the institute feasibility and slots
available in our calendar.
4. The entire event will be conducted in your institution campus.
5. Every student participating in the workshop will get a participation certificate.
6. At the end of the workshop one hacking competition/Quiz will be organized and
Winners of that competition will be getting the Certificate of by Eyan Techsol
along with prize & Gift Vouchers.

Benefits of associating with us

1. Name and Logo including website link of your institute will be published on our
official website (eyantechsol.com) citing that you are our Official Zonal Partner.
2. Authorized Team and trainers will visit your institute to organize the entire event.
3. An email will be sent to more than 1,00,000 users regarding your institutions
association and publicity.
4. Posters will be sent to you for effective regional publicity.
5. All India publicity through SMS and mails will also be held.


Benefits to the participants of HackCrack-2015

Students will be getting a chance to participate in a national hacking competition as well
as a chance to win prizes and gift vouchers. We will be providing knowledge to the
students in the field of Ethical Hacking & Cyber Security by showing them live hacking
and gateway. After attending our training sessions students can secure themselves and
others from various kinds of attacks.
Some key benefits to participant
____________________________________________________________________________________________________________________
Chance to win prizes and gift vouchers.
Chance to get placement in Eyan Techsol Noida
Learn Ethical Hacking techniques and countermeasures directly from
experienced Ethical Hackers.
Certificate of participation by Eyan Techsol to each and every participant.
Chance to participate in Ethical hacking competition at the end of the
workshop.
For your easy understanding we have included intense LIVE DEMOS for almost
topics like never before.
Eyan Techsol is the first Company to include Real Time Hands-Hacking
Competition.
Attend this workshop and get a valuable Certificate from Eyan Techsol
Take away Security Tool Kit preloaded DVDs.
Learn & Interact with renowned Industry Experts.
Receive an unparalleled education on the art of computer security with personal
one-on-one attention.
Hands on Demonstrations of Latest Hacking Techniques & Tools.
Hands on Demonstrations of various cases solved.
Power Point Presentation, Live Demos, Interactive Question & Answer sessions
and comprehensive reading material.
Video Lectures for future references
Have rich experience working on cases & training for cybercrime investigations
Get in touch with experienced hackers who have conducted more than 400
workshops & seminars for Students & Professionals across globe.
Get in touch with experienced hackers has helped top investigating agencies to
solve cybercrime cases.
Best students will be offered to work with us in Eyan Techsol, Noida.

Requirements

1. Co-operation and support for participation of at least 100 Students.
2. Seminar hall/classroom having the enough capacity to conduct hands-on-session for
at least 100 participants. Good Quality public address system, ideally two cordless
mikes will be required (collar mike preferred) . Projector/ Screen along with
black/white board for teaching and presentation purposes.
3. One small stereo jack cord to connect with laptop for its sound system.
4. One unrestricted (without proxy) fast internet connection for faculty.

Responsibility of an Organizer

1. Hospitality (2 days) for a team of 3-4 members.
2. Pick and Drop facility from the nearest railway station/bus stop/ airport.

Duration of Workshop

2 Days(consecutive) (6-7 hours per day)

Certification Policy
1. Certificate of Participation of HackCrack-2015 by Eyan Techsol, Noida for all
participants.
2. Certificate of Coordination from HackCrack-2015 for all the coordinators.

Eligibility Criteria

All School Student, Engineering, Science Graduates, MCA, MBA, and PhD students are
eligible for this championship. The basic requirement is the knowledge of Internet to
the participant. If anybody has the know-how of internet usage and how to send an
email then, they are absolutely eligible for this program!!!


Registration charges

1. Registration Charges are Rs. 1250/- per participant only.
2. The fee includes workshop training certificate, event registration and free Ethical
Hacking Tool kit to each member.

Thank You!!!!
We ensure that you will find our initiative extremely beneficial for your students career
growth.
If you have any queries kindly get back to us on the number provided below. We
anticipate a positive response from you and seek a long term association with your
esteemed organization.


For any further queries kindly contact us @:

Mr. Neeraj Batra
Business Head
HackCrack-2015
Email: neeraj@eyantechsol.com
Phone No.: +91-8800256561
+91-9971895094

Topics to be covered in the Ethical Hacking workshops
Session 1:
Ethics & Hacking:
- Hacking history : How it all begin
- Why is security needed?
- What is ethical hacking?
- Ethical Hacker Vs Malicious hacker
- Types of Hackers
- Building an approach for ethical hacking
- Steps in Ethical hacking

Basics of Internet, Networking & Hacking
- What is a Network?
- Types of network LANs, WANs & WLANs
- What is Internet?
- History of the Internet
- Basic Structure
- What is a Server?
- What is an IP Address?
- What is a domain name?
- IP-Domain Relation
- Client-Server Relationship Model
- Internet networking
- What is a port?
- What is Programming?
- Types of programming languages.
- What is a Programming loophole or error?
- Basic explanation of exploitation of loopholes

Information gathering & Google Hacking (Practical)
- Whois access (Demo)
- Maltego (Demo)
- 123people.com (Demo)
- IP scanning (Demo)
- Port scanning (Demo)
- Network scanning & its tools (Demo)
- What is Google and how does it work?
- Google tricks (Demo)
- Basic hacks (Demo)
- How can Google hacking help an Ethical Hacker? (Demo)
- Accessing online remote cameras

Windows security (Practical)
- Windows security (Demo)
- Registry (Demo)
- Port & Services (Demo)
- Securing Windows
- Looking for loop holes in windows

Session-2:
SQL injections attacks (Practical)
- Introduction to SQL
- What is SQL injection
- Checking SQL injection vulnerability (demo)
- Basic strategy of SQL injection (Demo)
- Getting login credentials using SQL injections (Live Demo)
- Using SQL to login via middleware language (Demo)
- URL and Forms (Demo)
- SQL Query SELECT, DROP etc. (Demo)
- SQL cheat sheets (Demo)
- Using source changes to bypass client side validation (Demo)
- Live demonstration of the attack (Demo)
- Using SQL injection tools (Demo)
- Importance of server side validation (Demo)
- How to protect your system from SQL Injections (Demo)

Man-in-the-middle attack (MITM Attack) (Practical)
- What is Man-in-the-middle attack?
- What is Backtrack Linux (Most common UNIX system for ethical
hacking)?
- Preparation for Man-in-the-middle attack (Demo)
- Setting Ettercap tool for the attack (demo)
- Identifying victim (Demo)
- Cache poisoning (Demo)
- Routing table modification (Demo)
- Eavesdropping (Demo)
- Countermeasures against MITM attack (Demo)

Cross site scripting attack (XSS) (Practical)
- What is XSS attack?
- Loopholes causing XSS attack?
- Identifying victim for XSS Attack (Demo)
- Preparation for XSS attack (Demo)
- Introduction to JavaScript
- Java script for XSS Attack (Demo)
- Attacking on website through XSS(Live Demo)
- Damages caused by XSS attack (Demo)
- Protecting systems against XSS attack (Demo)


Session-3: Phishing, cookie grabing & Session hijacking,
Social Engineering Attack

Phishing, Trojan & viruses
- What is phishing?
- Social engineering used in phishing (Demo)
- Phishing attack (Demo)
- Phishing sites (Demo)
- Protection against phishing (Demo)
- Viruses: Trojans, Worms, Malware, Spyware
- Modes of spreading
- Different Ways a Trojan can Get into a System (Demo)

- Creation of Trojan using cyber gate (Demo)
- Attacking a system using our created Trojan (Demo)
- Indications of a Trojan Attack (Demo)
- Some Famous Trojans and Ports They Use (Demo)
- How to Detect Trojans? (Demo)
- How to Determine which Ports are Listening (Demo)
- Netstat

Session hijacking & Cookie grabbing:
- Understanding sessions
- What are cookies? (Demo)
- Reading and writing cookies (Demo)
- Passive Vs Active session hijack (demo)
- TCP sessions and HTTP sessions (Demo)
- TCP session hijacking: Telnet (Demo)
- Stealing Cookies to hijack session using: XSS (Demo)
- Sniffers (Demo)
- Spoofing (Demo)
- Spoofing Vs Hijacking
- Types of Hijacking
- Protection against session Hijacking (Demo) Social Engineering Attacks:
- Overview of Social Engineering
- Case Study
- Example of Social Engineering Attack
- Java Applet Attack (Demo)

Session 4: DNS Spoofing, Forging & Cyber laws
DNS Spoofing:
- What is DNS Spoofing?
- How does it work?
- How to secure yourself?
- DNS Spoofing (Demo)

E-Mail Hacking, forging & tracing:
- How does an email work?
- Tracing an email (Demo)
- Spam
1. What is spamming?
2. Methods of prevention (Demo)
3. Laws about spamming
- Fake emails generation(Demo)
- Detecting fake emails (Demo)
- What is a firewall? & How can it help you
- How a firewall works
- What are key loggers? (Demo)
- Types of key loggers? (Demo)
- How key logger works? (demo)
- How to detect key logger? (Demo)

Fake SMS & Calls
- What is Fake SMS & Call?
- Method of generating fake SMS & Calls (Demo)
- Actions to be taken for fake SMS and Calls (Demo)

Charge/penalties against hacking in INDIA
- IT ACT 2000
- Cyber crime/terrorism and its type
- Sections in the Indian constitution Sec. 65, 66 A, B, C, D, 67, 69 etc.
- Penalty in all sections of Indian constitution



For Any Query you can freely contact anytime:

Mr. Neeraj Batra
Business Head
HackCrack-2015
Email: Neeraj@eyantechsol.com
Phone No.: +91-8800256561
+91-9971895094

Das könnte Ihnen auch gefallen