0% found this document useful (0 votes)
10 views11 pages

Agashya

The document reports on a cybersecurity workshop held at Manakula Vinayagar Institute of Technology, covering various topics over six days, including an introduction to cybersecurity, ethical hacking tools, network analysis with Wireshark, phishing techniques using Zphisher, social engineering with Storm Breaker, and location hacking. Participants learned about the significance of cybersecurity, practical applications of hacking tools, and preventive measures against cyber threats. The workshop emphasized the importance of ethical considerations and security awareness in the field of cybersecurity.

Uploaded by

nsaranya363
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views11 pages

Agashya

The document reports on a cybersecurity workshop held at Manakula Vinayagar Institute of Technology, covering various topics over six days, including an introduction to cybersecurity, ethical hacking tools, network analysis with Wireshark, phishing techniques using Zphisher, social engineering with Storm Breaker, and location hacking. Participants learned about the significance of cybersecurity, practical applications of hacking tools, and preventive measures against cyber threats. The workshop emphasized the importance of ethical considerations and security awareness in the field of cybersecurity.

Uploaded by

nsaranya363
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY

affiliated to Pondicherry University


Approved by NBA and Accredited by NAAC with "A" Grade
(A Unit of Sri Manakula Vinayagar Group of Education Institutions)
Kallteerthalkuppam, Puducherry - 605107, Ph:0413-2643007, Fax:2643008

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

REPORT ON CYBER SECURITY

Submitted By:
Agashya.B
III YR CSE – B
22td0305
Day 1: Introduction to Cybersecurity and
Linux

Date: 17-01-2025

The first day of the workshop introduced participants to the domain


of cybersecurity, its importance, and various career opportunities in
the field. The session also covered a fundamental overview of the
Linux operating system, which is widely used in cybersecurity.

Key topics discussed:

1. Introduction to cybersecurity and its significance


2. Different types of cyber threats and attacks
3. Basics of Linux commands and file system
4. Overview of security tools available in Linux
Day 2: Basics of Hacking Tools and
Terminologies

Date: 18-01-2025

On the second day, participants were introduced to various ethical


hacking tools and the key terminologies used in cybersecurity.
Theoretical explanations were provided on how these tools
function and their applications in penetration testing.

Key topics discussed:


1. Ethical hacking principle
2. Common cybersecurity terminologies (exploits, payloads,
etc.)
3. Introduction to hacking tools like Metasploit, Nmap, and
Aircrack-ng
4. Legal and ethical aspects of cybersecurity
Day 3: Wireshark – Network Analysis

Date: 20-01-2025

Wireshark is a powerful network protocol analyzer that allows users


to capture and inspect the details of network traffic in real time. It is
widely used by cybersecurity professionals to diagnose network
issues and detect malicious activities.

Key learnings:
 Understanding network packets and protocol
 Capturing live network traffic
 Analyzing captured data for security vulnerabilities
 Identifying potential cyber threats using packet analysis
Day 4: Zphisher – Phishing Toolkit

Date: 21-01-2025

Zphisher is an open-source phishing tool that allows ethical hackers


to simulate phishing attacks by creating fake login pages of popular
websites. It is primarily used for security awareness training and
penetration testing.

How Zphisher is Used:


 Set up phishing campaigns with automated scripts
 Generate fake login pages that mimic real websites
 Capture user credentials entered on phishing pages
 Understand the risks and preventive measures against
phishing attacks

Key learnings:
1. Understanding phishing attacks
2. Setting up phishing campaigns using Zphisher
3. Capturing credentials using phishing pages
4. Mitigating and preventing phishing attacks
Day 5: Storm Breaker – Social
Engineering Tool

Date: 22-01-2025

Storm Breaker is a social engineering tool designed for gathering


user information by exploiting social interactions. It can be used to
obtain location data, IP addresses, and other sensitive details
through well-crafted attack vectors.

How Storm Breaker is Used:

 Creating fake links that extract information from victims


 Gathering geolocation and device details
 Conducting ethical social engineering attacks for security
assessments
 Raising awareness about social engineering threats and
defenses
Key learnings:

1. How social engineering attacks work


2. Features of Storm Breaker
3. Using social engineering for ethical hacking

4. Defensive measures against social engineering attacks


Day 6: Location Hacking & Workshop
Summary

Date: 23-01-2025

The final day of the workshop covered location hacking techniques


using open-source GitHub repositories. These techniques
demonstrate how location data can be accessed and manipulated
through various online methods.

How Location Hacking is Performed:

 Using IP tracking to determine geolocation


 Manipulating GPS data using spoofing techniques
 Ethical considerations in location tracking
 Preventive measures against unauthorized tracking
Key learnings:

1. GPS spoofing and tracking techniques


2. Demonstration of real-time location tracking
3. Ethical implications of location hacking
4. Summary and final Q&A session
Conclusion

 Gaining fundamental cybersecurity knowledge


 Learning to analyze network traffic using Wireshark
 Understanding phishing attacks through Zphisher
 Exploring social engineering techniques with Storm Breaker
 Identifying and preventing geolocation tracking threats
 Practical application of ethical hacking tools
 Legal and ethical implications of hacking techniques
 Enhancing security awareness and defenses
 Real-world case studies on cybersecurity threats

 Cybersecurity as a career pathway and future opportunities

You might also like