Search This Blog

Sunday, 29 January 2017

Faculty Development Programme on Recent Trends in Information and Network Security - NMAMIT

Day 1 summary
Dr. Manish Kumar discussed the concepts of Network Penetration Testing. He explained the concept of Active scanning and passive scanning. The vulnerabilities of Microsoft Windows XP service pack 2 was explained. He demonstrated kali Linux OS that can be used to beak in the Windows XP system and the Application based attack to beak in the system. He demonstrated the MCF commands, Key capture Techniques in the Windows XP. Lastly created the malicious exe file which can help to get access in Windows XP by bypassing the Firewall and Antivirus. The attack that can be possible in hand held devices using malicious link was explained along with the Man in the Middle attack.

Day 2
Summary Mr. Ashutosh Shirole delivered a talk on HTTP and its variants. He explained the concepts of ARP, and various attacks on the ARP cache. The demonstration of creating the fake access point was done. A fake access point was created with open wifi as SSID and the device which connected this AP has to compromise with its credentials. Wargames were played with bandit and natas. Both are dealing with password cracking.

Day 3
summary In the morning session Dr. B.R.Chandavarkar delivered the talk on Data Security. He discussed on Substitution Techniques used in early days of Cryptography. Explained the topics like Symmetric Key Cryptography, Asymmetric Key Cryptography, Rivest-Shamir Adleman (RSA) algorithm, DES (Data Encryption Standard), Advanced DES, Double DES, Triple DES and AES. The DES, and its variants were demonstrated in MATLAB and text were encrypted to form ciphers and also decrypted to form plain text. In the afternoon session Dr. Geetha V delivered the talk on Basic Terminology of IOT, Need for IOT, Attack surfaces in IOT, Trends, Problems and Security Challenges. Later on, demonstration of the Configuring of Raspberry Pi board was done. And the files from the board were extracted and drawbacks were demonstrated. Precautionary measures to avoid the intrusion in IOT were discussed. RSA key Exchanges was demonstrated over SSH.

Day 4 Summary
In the morning session Dr. Balachandra gave a talk on Intrusion and its detection. Then discussed about the various intrusion detection techniques like Misuse Detection Anomaly Detection, Advantages and Disadvantages of the Intrusion detection techniques. Then he explained about the Machine Learning-"The Artificial Intelligence", Supervised Learning, Regression, Decision Tree, K-means, K mediods and hierarchal Clustering. In the afternoon session Hands On instruction was provided by Mrs Manjula C Belavagi and Ms.Chetana Pujari. The complete demonstration on the K-means, Decision Tree, and Hierarchical Clustering was done along with the changes in hierarchical clustering with the distance matrix.

Day 5 Summary
Ms. Nisha P Shetty, Ms. Pooja S, Mr. Arjun C V, Mr. Chethan Sharma from MIT, Manipal discussed and demonstrated on various topics related to Genetic Engineering, Security Using Fingerprint Deployment of Cloud , Detection of a vulnerability Introduction to Virus, Creating Some Viruses, Generating fraudulent mails, Ethical Hacking using SQL injection. Resource Person gave an introductory talk on intrusion, Intercepting intrusion vulnerability, later he explained about benefits of Virtualization. A brief explanation on hardware level virtualized system. Later he explained about the information gathering, Tools available in kali Linux such as Dimitry, load balance detector, dnsenum, mattego were executed by bash. Vulnerability Analysis was demonstrated by Open Vas tool. Denial of services was demonstrated on the well-known websites. Ettercap tool was used to perform Man in the Middle Attack. Password were cracked using John the Ripper Tool. Phishing was explained with the demonstration. Various SQL attacks were explained like SQL injection, Inferential Attacks, in band attack, out band attack. And Hands-on Ping of Death was demonstrated on the systems.







No comments:

Post a Comment

Note: only a member of this blog may post a comment.