CTF Workshop


 20th Nov & 21st Nov
 2 Days
 Online

Abstract

This workshop will introduce you to OWASP Top 10, a platform for VAPT and tools used for footprinting & scanning. Moreover, participants will get to know how a system can be compromised, password cracking and securing the system from such attacks.


Topics of Concern

1. Exploration of other platforms for VAPT

2. Introduction to OWASP Top 10

3. Footprinting and reconnaissance

4. Scanning

5. Gaining Access

6. Password Attacks

7. Escalating Privileges

8. Executing Applications

9. Hiding Files

10. Covering Tracks

11. clearev


Outcome

Participants will be able to understand the actions that can be undertaken to exploit, attack, protect and manage the Electromagnetic Spectrum.


Keynote Speakers

Dr. Rakesh Singh Kunwar
Ex-SSO in NICFS, New Delhi, MHA. VAPT Expert

Dr. Akash Thakar
Certified Ethical Hacker, Computer Hacking Forensic Investigator and Certified EC-Council Instructor Expert - Digital Forensic Investigation Process and Memory Forensics.

Workshop details

-----------------Date: 20/11/22-----------------

Dr. Rakesh Singh Kunwar

Theoretical + Practical: 2 hour

◉ Introduction to OWASP Top 10 ---20 Mins
   a. Broken Access Control
   b. Cryptographic Failures
   c. Injection
   d. Insecure Design
   e. Security Misconfiguration
   f. Vulnerable and Outdated Components
   g. Identification and Authentication Failures
   h. Software and Data Integrity Failures
   i. Security Logging and Monitoring Failures
   j. Server Side Request Forgery (SSRF)

◉ Exploration of other platforms for VAPT: ---20 mins
   a. Damn Vulnerable Web Application(DVWA)
   b. bWAPP, or a buggy web application
   c. Webgoat

◉ Footprinting and reconnaissance: ---40 mins
   a. Footprinting through Search Engines
   b. Google Hacking
   c. Examining HTML Source and Examining Cookies
   d. Email Footprinting
   e. Competitive Intelligence
   f. DNS Footprinting
   g. Footprinting through Social Engineering

◉ Scanning --40 mins
   a. Port Scanning
   b. Network Scanning
   c. Vulnerability scanning

-----------------Date: 21/11/22-----------------

Dr. Akash Thakar

Theoretical + Practical: 2 hour

◉ Gaining Access (45 Min.)
   --> Password Cracking
       a. Types of password cracking techniques
       b. Bypassing windows admin password
       c. Bypassing Linux root password
◉ Creating a backdoor to compromise the target system (30 min.)
◉ Maintaining access (10 Min.)
◉ Escalating privileges (15 min.)
◉ Clearing tracks (10 Min.)
◉ Q&A (10 min.)

© 2022 Sainya Ranakshetram. All Rights Reserved. Proudly Made by Zindagi Technologies
Total Visitors : 66,792