C411ing 0n 411 w4nn4b3 hax0r3rz - j00r 7im3 h4z c0m3 . Here is a wonderful opportunity to become what you have always wanted to be. Your ticket to stardom and guru status. Here is how to become a hacker. MEC(Model Engineering College) Association of Computer Students(MACS) and Excel2k6 brings you *Smashing the Stack - The Ethical Hacking Workshop*.
So you think you have it in you to become a hardcore hax0r3r ? Then you can't afford to miss this once-in-a-lifetime opportunity. Answer your true calling. We have Guru Hackers from Bangalore to teach you the ropes. Mentored by *Kalyan Varma* ( http://kalyanvarma.net/ ) and his team, learn about hacking websites and exploiting common flaws from the *Sanctuary ABN AMRO Wildlife Photographer of the year 2005** . *He will tell you how to break into servers with the same ease with which he clicks pictures of tigers and snakes. So get ready to smash the stack for fun and knowledge. Register now. Limited seats only. *Details* *Venue* : New Computer Science Lab, Model Engineering College *Dates* : February 3 and 4 *Timings* : Morning session (theory) ? 9:30-12:30 Afternoon session(hands on) ? till 4:30 pm *Registration fees :* Rs 250 per head. 55 seats are available and will be allocated strictly on SOP basis( This does not include food ). Buffet coupons available at the venue *Mentor*: Kalyan Varma Alluri. (http://kalyanvarma.net/ ) *Register here <http://www.excelmec.org/registration/registration.php>*before 29th January : ( for registration, you will need to submit a statement of purpose in the form. ). http://www.excelmec.org/ *Queries* : hacking at excelmec.org *Syllabus : ** *== Day 1 == Introduction - History - Review of high profile attacks Basics - TCP/IP - Network services - http System Security - Best practices - Windows vs Unix Security models - Filesystems - OS services Network Security - Introduction to network services - Network scanning - firewalls Wireless Security - Introduction to Wifi and WEP - Weakness in WEP protocol - How to break WEP protocol - Scanning in wifi networks Denial of Service Attacks - Network DOS - Types, methods and prevention - Application level DOS ==Day 2== Smashing the Stack - Secure programming - buffer overflow - do's and dont's Web Security - Cross Site scripting - Cross-site forging - Cookie Tampering - SQL Injection - Hidden variables - Inputs and outputs - URL Encoding Vulnerability - Open Source tools Misc Topics - Abuse vs Cracking - Social Engineering - Physical Security - Cryptography - Intrusion Detection and Forensic analysis Regards, Excel Team askynot at excelmec.org http://www.excelmec.org *Syllabus : ** *== Day 1 == Introduction - History - Review of high profile attacks Basics - TCP/IP - Network services - http System Security - Best practices - Windows vs Unix Security models - Filesystems - OS services Network Security - Introduction to network services - Network scanning - firewalls Wireless Security - Introduction to Wifi and WEP - Weakness in WEP protocol - How to break WEP protocol - Scanning in wifi networks Denial of Service Attacks - Network DOS - Types, methods and prevention - Application level DOS ==Day 2== Smashing the Stack - Secure programming - buffer overflow - do's and dont's Web Security - Cross Site scripting - Cross-site forging - Cookie Tampering - SQL Injection - Hidden variables - Inputs and outputs - URL Encoding Vulnerability - Open Source tools Misc Topics - Abuse vs Cracking - Social Engineering - Physical Security - Cryptography - Intrusion Detection and Forensic analysis Regards, Excel Team askynot at excelmec.org http://www.excelmec.org -------------- next part -------------- An HTML attachment was scrubbed... URL: http://ilug-cochin.org/pipermail/mailinglist_ilug-cochin.org/attachments/20060126/26fe8066/attachment.htm
