Hi,

I hope someone would be able post the soft copy of presentations. It will be
of great help for people like me, who cant attend this event. Had I been in
Kochi, I wud have definetly attended this event.

Regards
Dino


On 1/26/06, Cherian Thomas <cherian.in at gmail.com> wrote:
>
> C411ing 0n 411 w4nn4b3 hax0r3rz - j00r 7im3 h4z c0m3 . Here is a wonderful
> opportunity to become what you have always wanted to be. Your ticket to
> stardom and guru status. Here is how to become a hacker. MEC(Model
> Engineering College) Association of Computer Students(MACS) and Excel2k6
> brings you *Smashing the Stack - The Ethical Hacking Workshop*.
>
> So you think you have it in you to become a hardcore hax0r3r ? Then you
> can't afford to miss this once-in-a-lifetime opportunity. Answer your true
> calling. We have Guru Hackers from Bangalore to teach you the ropes.
> Mentored by *Kalyan Varma* ( http://kalyanvarma.net/ ) and his team, learn
> about hacking websites and exploiting common flaws from the *Sanctuary ABN
> AMRO Wildlife Photographer of the year 2005** . *He will tell you how to
> break into servers with the same ease with which he clicks pictures of
> tigers and snakes.
>
>
>
> So get ready to smash the stack for fun and knowledge. Register now.
> Limited seats only.
> *Details*
>
> *Venue* : New Computer Science Lab, Model Engineering College
>
>
>
> *Dates* : February 3 and 4
>
>
>
> *Timings* : Morning session (theory) ? 9:30-12:30
>
>
>
> Afternoon session(hands on) ? till 4:30 pm
>
>
>
> *Registration fees :* Rs 250 per head. 55 seats are available and will be
> allocated strictly on SOP basis( This does not include food ). Buffet
> coupons available at the venue
>
>
>
> *Mentor*: Kalyan Varma Alluri. (http://kalyanvarma.net/ )
>
>
>
> *Register here <http://www.excelmec.org/registration/registration.php>*before 
> 29th January  : ( for registration, you will need to submit a
> statement of purpose in the form. ). http://www.excelmec.org/
>
>
>
> *Queries* : hacking at excelmec.org
>
> *Syllabus : **
>
> *== Day 1 ==
>
> Introduction
> - History
> - Review of high profile attacks
>
> Basics
> - TCP/IP
> - Network services
> - http
>
> System Security
> - Best practices
> - Windows vs Unix Security models
> - Filesystems
> - OS services
>
> Network Security
> - Introduction to network services
> - Network scanning
> - firewalls
>
> Wireless Security
> - Introduction to Wifi and WEP
> - Weakness in WEP protocol
> - How to break WEP protocol
> - Scanning in wifi networks
>
> Denial of Service Attacks
> - Network DOS
> - Types, methods and prevention
> - Application level DOS
>
>
> ==Day 2==
>
> Smashing the Stack
> - Secure programming
> - buffer overflow
> - do's and dont's
>
> Web Security
> - Cross Site scripting
> - Cross-site forging
> - Cookie Tampering
> - SQL Injection
> - Hidden variables
> - Inputs and outputs
> - URL Encoding Vulnerability
> - Open Source tools
>
>
> Misc Topics
> - Abuse vs Cracking
> - Social Engineering
> - Physical Security
> - Cryptography
> - Intrusion Detection and Forensic analysis
>
>
>
> Regards,
>
> Excel Team
> askynot at excelmec.org
> http://www.excelmec.org
>
>
>
> *Syllabus : **
>
> *== Day 1 ==
>
> Introduction
> - History
> - Review of high profile attacks
>
> Basics
> - TCP/IP
> - Network services
> - http
>
> System Security
> - Best practices
> - Windows vs Unix Security models
> - Filesystems
> - OS services
>
> Network Security
> - Introduction to network services
> - Network scanning
> - firewalls
>
> Wireless Security
> - Introduction to Wifi and WEP
> - Weakness in WEP protocol
> - How to break WEP protocol
> - Scanning in wifi networks
>
> Denial of Service Attacks
> - Network DOS
> - Types, methods and prevention
> - Application level DOS
>
>
> ==Day 2==
>
> Smashing the Stack
> - Secure programming
> - buffer overflow
> - do's and dont's
>
> Web Security
> - Cross Site scripting
> - Cross-site forging
> - Cookie Tampering
> - SQL Injection
> - Hidden variables
> - Inputs and outputs
> - URL Encoding Vulnerability
> - Open Source tools
>
>
> Misc Topics
> - Abuse vs Cracking
> - Social Engineering
> - Physical Security
> - Cryptography
> - Intrusion Detection and Forensic analysis
>
>
>
> Regards,
>
> Excel Team
> askynot at excelmec.org
> http://www.excelmec.org
>
> _______________________________________________
> Mailinglist mailing list
> Mailinglist at ilug-cochin.org
> http://ilug-cochin.org/mailman/listinfo/mailinglist_ilug-cochin.org
>
>
>


--
d i n o   c   k o r a h
Phone: +44 7886 757 960
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
http://ilug-cochin.org/pipermail/mailinglist_ilug-cochin.org/attachments/20060126/72a74c50/attachment-0001.htm

Reply via email to