Thursday, 24 December 2015

From 14 Dec 2015 to 24 Dec

Almost done with the project work. This week was focused on preparation of final report and presentation and report checking with the teacher.

Sunday, 6 December 2015

From 30 Nov to 5 Dec


The next phase of the project was to implement phishing techniques. The clone of gmail.com was created to depict the phishing technique. The anti phishing techniques were are tested.

Saturday, 28 November 2015

23 Nov 2015 - 28 Nov 2015


Having completed with the initial phase of project, now moving to the next phase of project that is scanning of website using online tools like zenmap and conducting various other tests to extract more information  about the website like the traceroute information and registrant details.

Sunday, 22 November 2015

From 16 Nov to 21 Nov


This week I started working on project module named Penetration Testing. I complete the first set of modules that consisted of information gathering and various submodules like remote system discovery, name servers and DNS records. It was fun getting started with the project and working with different online tools.

Saturday, 14 November 2015

9 Nov - 14 Nov


9 Nov - 11 Nov, I came to know about firewall technologies.

On 12 Nov, I was taught about patch management.

13 Nov and 14 Nov:the topic of security convergence was covered.

Sunday, 8 November 2015

2 Nov - 7 Nov 2015


Two major topics were taught in this week:

  1. Pen testing Hacking with Backtrack
  2. Online money making

Saturday, 24 October 2015

From 19 Oct to 24 Oct


On 19 and 20 Oct, I learned how to secure computers.

On 21 Oct, the concept of sniffers was explained and on 22 Oct I was taught how to create security policy.

23 Oct and 24 Oct--I studied how to identify the terrorist.

Sunday, 18 October 2015

12 Oct - 16 Oct 2015


Following topics were covered in this week:

1. Wireless basic overview: WEP ,WPA, WPA2
2. Making fake AP
3. Hacking WEP,
4. Hole in mole
5. mitm attack
6. use of Gerix
7. use of fern
8. Cracking without dictionary

Saturday, 10 October 2015

From 5 Oct to 9 Oct


On 5 Oct, I studied about "Exploiting with Metasploit Framework 4.0" and on 6 Oct Spamming was explained.

7-8 Oct : I learned how to hack USB devices.

On 9 Oct, the concept of privacy on Internet-Anonymous was covered and on 10 Oct I studied about Live Firewall Implementation

Sunday, 4 October 2015

28 Sept to 3 Oct 2015


The list contains the topics that were covered in the week:
1. Sniffing via cain able
2. Sniffing via wireshark
3. Phishing
4. dos& ddos
5. Etthercap sniffing

Thursday, 1 October 2015

From 26 Oct to 30 Oct 2015


26 Oct and 27 Oct: the concept of proxy server technologies was demonstrated.

On 28 Oct, I studied how to hack web browsers (Firefox, IE, Chrome).

On 29 Oct, I learned hoe to prevent data loss.

30 Oct  Oct: My teacher explained about the credit card frauds

Monday, 28 September 2015

21 Sept- 26 Sept 2015


21 Sept-I studied about: How to hack routers  and on 22 Sept I learned to hack firewalls.

On 23 and 24 Sept I was made to understand the hacking procedure of Mobile Phones and Handheld Devices (PDAs)

25 Sept and 26 Sept- I was explained in detail about bluetooth hacking.

Sunday, 20 September 2015

From 14 Sept to 19 Sept 2015

Following topics were covered in this week:

phishing
techniques of phishing
anti phishing techniques

Saturday, 12 September 2015

7 - 12 September 2015


On 7 and 8 Sept I studied about cryptography and steganography.
9 Sept- I learned about penetration testing.
10 Sept- I learned how to write virus codes.
11 Sept and 12 Sept-Introduction was given on Kali Linux Operating System.

Saturday, 5 September 2015

Sunday, 30 August 2015

24 Aug 2015 - 29 Aug 2015


On 24 Aug, brief introduction was given about underground ethical hacking community.

On 25 Aug, I learned about social engineering and on 26 Aug, phishing and identity threat was explained.

On 27 Aug, we were demonstrated about how the email accounts are hacked.

On 28 Aug and 29 Aug, I came to know about Denial of Service .

Monday, 24 August 2015

17 Aug - 22 Aug

System hacking was the basic topic covered in this week.

Following are the basic topics for this week:

1. system hacking
2. system hacking via BackTrack
3. Use of key logger.
4, Cracking password linux, windows

Sunday, 16 August 2015

From 10 Aug to 14Aug 2015


On 10 Aug I learned about the concept of enumeration and on 11 Aug, description was given about the enumeration tools used in Kali or BackTrack.

On 12 and 13Aug, I studied about network enumeration and SNMP enumeration.

On 14 Aug, use of  pingswep and hping3  and NetBIOS enumeration was explained.

Thursday, 13 August 2015

From 7 Aug - 12 Aug


On 7 Aug, I learned how to hack web servers and on 8 Aug, Web based password Cracking Techniques were explained.

9 Aug- I learned to hack wireless networks.

10 Aug- Brief description about physical security was given.

11 Aug and 12 Aug- I came to know about the concept of linux hacking

Saturday, 8 August 2015

3 Aug- 8 Aug 2015


This week was focused on scanning and using various scanning tools like accunetix, nmap, zenmap.

This list has in store all the topics that were covered this week:
1. Scaning
2. Scanning tool in Backtrack
3. Use of scanning tool ZAP,  acunetix,  nessus, netcraft,zmap
4. report generation
5. banner grabbing
6. Drawing network diagram

Monday, 3 August 2015

From 27 July 2015 to 1 August 2015


27 July- I learned about whois domain tool.

28 July - 1 Aug
Following topics were covered:-

1. scaning introduction
2. scaning methodologies
3. Port scaning
4. networking scaning
5. scaning beyond IDS
6. banergrabing

Sunday, 26 July 2015

From 20 July 2015 to 25 July 2015


On 20 July, I was given the Introduction of Yougetsignal. And on 21 July I learned about Google dorks & GHDB.

22July - 25 July: Footprinting was explained which covered footprinting using relation search, footprinting via mirroring tool , network footprinting and footprinting via Backtrack.

Saturday, 18 July 2015

From 13th July 2015 to 18th July 2015


On 13 July, I came to know about the concept of  email Forgery, Spamming and Spoofing that how hackers send fake emails and fool people.And on 14 July, I learned about Tracing - Flooding & Bombing with Security.

On 15 July hacking laws were explained and on 16 July and 17 July, practical aspects of networking were made clear.

On 18 July, I learned about IP Address & MAC Address Spoofing – Including ARP & RARP Protocols.

Monday, 6 July 2015

Second Week: 6th July 2015 to 11th July 2015

On 6th July, I learned about the methodologies to attack the target recent bug.


On 7th July, I came to know about the concept of IPv6 threats and terminology and on 8th July, we were taught about proxy servers and Virtual Private Networks.

On 9th and 10th July, I learned about email tracing and protection and on 11th July, I revised and practised all the topics I had learnt in the week.

Saturday, 4 July 2015

First Week: 1 July 2015 to 4 July 2015

On the first day I came to know about the company rules and regulations and the staff members give me introduction about the company like in which of the fields they are working on.

After that, my teacher introduced me to the Course Contents of my Training like what are the modules on which i will be working on.
I started with  Introduction to Cyber Security & Information Security on 3rd July.
On 4th July, I learned about the concept of hacking phases and security issue

Wednesday, 1 July 2015

Daily Diary of 6 months Industrial Training

I am doing my 6 months industrial training in STEP GNDEC, Ludhiana.
Whatever I am doing in the training, I briefly explaining here as Daily diary
.