C411ing 0n 411 w4nn4b3 hax0r3rz - j00r 7im3 h4z c0m3 . Here is a wonderful
opportunity to become what you have always wanted to be. Your ticket to
stardom and guru status. Here is how to become a hacker. MEC(Model
Engineering College) Association of Computer Students(MACS) and Excel2k6
brings you *Smashing the Stack - The Ethical Hacking Workshop*.

So you think you have it in you to become a hardcore hax0r3r ? Then you
can't afford to miss this once-in-a-lifetime opportunity. Answer your true
calling. We have Guru Hackers from Bangalore to teach you the ropes.
Mentored by *Kalyan Varma* ( http://kalyanvarma.net/ ) and his team, learn
about hacking websites and exploiting common flaws from the *Sanctuary ABN
AMRO Wildlife Photographer of the year 2005** . *He will tell you how to
break into servers with the same ease with which he clicks pictures of
tigers and snakes.



So get ready to smash the stack for fun and knowledge. Register now. Limited
seats only.
*Details*

*Venue* : New Computer Science Lab, Model Engineering College



*Dates* : February 3 and 4



*Timings* : Morning session (theory) ? 9:30-12:30



Afternoon session(hands on) ? till 4:30 pm



*Registration fees :* Rs 250 per head. 55 seats are available and will be
allocated strictly on SOP basis( This does not include food ). Buffet
coupons available at the venue



*Mentor*: Kalyan Varma Alluri. (http://kalyanvarma.net/ )



*Register here <http://www.excelmec.org/registration/registration.php>*before
29th January  : ( for registration, you will need to submit a
statement of purpose in the form. ). http://www.excelmec.org/



*Queries* : hacking at excelmec.org

*Syllabus : **

*== Day 1 ==

Introduction
- History
- Review of high profile attacks

Basics
- TCP/IP
- Network services
- http

System Security
- Best practices
- Windows vs Unix Security models
- Filesystems
- OS services

Network Security
- Introduction to network services
- Network scanning
- firewalls

Wireless Security
- Introduction to Wifi and WEP
- Weakness in WEP protocol
- How to break WEP protocol
- Scanning in wifi networks

Denial of Service Attacks
- Network DOS
- Types, methods and prevention
- Application level DOS


==Day 2==

Smashing the Stack
- Secure programming
- buffer overflow
- do's and dont's

Web Security
- Cross Site scripting
- Cross-site forging
- Cookie Tampering
- SQL Injection
- Hidden variables
- Inputs and outputs
- URL Encoding Vulnerability
- Open Source tools


Misc Topics
- Abuse vs Cracking
- Social Engineering
- Physical Security
- Cryptography
- Intrusion Detection and Forensic analysis



Regards,

Excel Team
askynot at excelmec.org
http://www.excelmec.org



*Syllabus : **

*== Day 1 ==

Introduction
- History
- Review of high profile attacks

Basics
- TCP/IP
- Network services
- http

System Security
- Best practices
- Windows vs Unix Security models
- Filesystems
- OS services

Network Security
- Introduction to network services
- Network scanning
- firewalls

Wireless Security
- Introduction to Wifi and WEP
- Weakness in WEP protocol
- How to break WEP protocol
- Scanning in wifi networks

Denial of Service Attacks
- Network DOS
- Types, methods and prevention
- Application level DOS


==Day 2==

Smashing the Stack
- Secure programming
- buffer overflow
- do's and dont's

Web Security
- Cross Site scripting
- Cross-site forging
- Cookie Tampering
- SQL Injection
- Hidden variables
- Inputs and outputs
- URL Encoding Vulnerability
- Open Source tools


Misc Topics
- Abuse vs Cracking
- Social Engineering
- Physical Security
- Cryptography
- Intrusion Detection and Forensic analysis



Regards,

Excel Team
askynot at excelmec.org
http://www.excelmec.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
http://ilug-cochin.org/pipermail/mailinglist_ilug-cochin.org/attachments/20060126/26fe8066/attachment.htm

Reply via email to