Agenda : Introduction to Networks –IPv4 , IPv6 Virtual Environment –Difference between Physical and Virtual Environment CEH Phases –Footprinting (Information Gathering) Search Engine, Google Maps, GHDB, Whois, Social Engineering, Archive.org, Maltego, FOCA –Scanning TCP Connect / (Full Open Scan), Stealth Scan (Half-open Scan), Inverse TCP Flag Scanning (Xmas, FIN, NULL, ACK, IDLE Scan ), UDP Scanning, OS Fingerprinting & Banner Grabbing –Enumeration Services and ports to Enumerate, NetBIOS Enumeration, LDAP Enumeration, NTP Enumeration, –Vulnerability Assessment Types of Vulnerability Assessments, Vulnerability Assessment Life-Cycle, Acunetix Vulnerability Scanner –System Hacking Types of Password Attacks, Security Account Manager (SAM), Password Cracking Tools, Escalating Privileges, Hiding Files Wireshark –What is Wireshark, How to use Wireshark
Thursday, March 31, 2022
9:00 AM – 12:45 PM UTC
Head of Hebron Technopark
GDSC Lead
Technical Member
Technical Member
Public Relations & Photography
Organizer & Media Editor
Technical Member
Organizer
Technical Member
Public Relations
Technical Member
Technical Member
Technical Member
Technical Member
Technical Member
Organizer & Technical Member