Ethical Hacking 2019

Expert:

Utsav Bheda(Day 1), Sachin Dhedia (Day 2)

 

Association of the expert: Certified independent cyber crime investigator, Skynet secure solutions

 

Date/s of the event: 25th August, 2019 and 1st September, 2019

Participants: 60+ participants

 

Objectives of the activity:

  • To give an introduction and spark interest about ethical hacking in the minds of students
  • To explain students how different systems and softwares operate in regard to ethical hacking
  • To give highly interested students a direction for future ethical hacking education

 

Contents:

An ethical hacking workshop was conducted by IETE-SF with ICWiCOM in association with Skynet secure solutions. With increasing dependency on software solutions in our day to day life, cyber security has become extremely essential. Hence, first year engineering students were given an opportunity to dive into this deep science and learn how to protect themselves from experts. The workshop was held on two Sundays.

Mr.Bheda started off day one by telling the students about the five steps of ethical hacking. All the learning process was based on the Microsoft application ‘Command prompt’. Through this the students learnt about IP addresses, their computer identity and how computers behave in a network at a fundamental level. The bedrock of this topic, which are the different levels of security were broken down in detail. Later, after the lunch break, a software KaliLinux taught students about ping, zen maps and keyloggers.

On the second day, Mr.Sachin Dhedia came to teach the students. Initially, he explained how to ‘inspect elements’ in a pre-typed password and how to interpret this information correctly. They were then taught about online phishing and how to avoid it. A software ‘Wireless key’ was introduced, which helped the students to see what WiFi networks the laptop has been associated with in the past. Lastly, several commands like “msfvenom” and “goldeneye” were taught to students.

The professor concluded on a positive note, encouraged the students to explore such sciences with curiosity and wished them the best of luck for the future.

 

Outcomes:

  • Students gained a thorough understanding and introduction about the depth of this topic
  • Students learnt about their online and computer identity and police forensics

Students who were further curious about this subject gained a direction to walk on

Photographs