CHASE-2007 Conference on Hacking and Security
Home | Talks | Training | Register | Contests | Venue | Sponsors | Team | Archives | Press | Contact Us |
English | اردو

Call for Papers
Call for papers for CHASE-2009 is open. Please submit your papers as early as possible. Deadline is Friday September 04, 2009.

Training
There are four tracks of training available in CHASE-2009. Discount applicable if you register early. Please see details here.

International Participants
Partial or full travel funding is available for speakers coming from outside of Pakistan. FREE boarding and lodging for all the international participants. Please see details here.

Registration
If you wish to attend the talks or would like to attend the trainings, please register here as early as possible. Discount applicable if you register early.

Free Internet and Gaming
Free access to the Internet will be provided during the event. Further, there is an arrangement of bzflag gaming competition among the interested participants.

Sponsors
Open Source Resource Center - PSEB
ESecurity
Netmag
Nexlinx

Would like to sponsor?
Please click here


Mailing List
Please join our mailing list to get latest updates and information
groups.yahoo.com/group/ChaseMela/
Takhtee
An education and social project that we endorse. Please visit the page for more information.

CHASE-2009 | Conference On Hacking And Security
Friday-Tuesday, November 06-10, 2009, Lahore.

Training - 1: Linux System and Network Administration For Hackers

Training: Linux System and Network Administration For Hackers
Trainer: To Be Decided - Esecurity
Duration: Two Days - Saturday and Sunday November 07 - 08, 2009.
Cost: See below. Discount applicable if you register early.

Early
Before September 25, 2009
Regular 
Before October 23, 2009
Late
After October 23, 2009.
Rs. 5000/- Rs. 6,000/- Rs. 7,000/-

  • Lunch and two tea breaks are included.
  • At the end of training you will get:
    • Certificate of completion of training.
    • CD with all the programs and tools.
  • FREE boarding and lodging for all foreign participants.
  • Please bring your laptop when you come to attend the training session. Limited number of computers are available for those who cannot bring a laptop.
How To Register
Please download and fill Training Registration Form and post along with payment to the address given in the form.

After you have posted the registration form, please send an electronic copy to the email address given below:

register AT chase DOT org DOT pk

A confirmation email will be sent once the post has been received. After the payment has been successfully transferred, a receipt will also be posted to your address as well which you should produce at the time of the event.

Training Overview
A good and stable operating system plays a pivotal role in all the tasks which are performed by a hacker or information security professional. The way a hacker maintains, operates and plays with an operating system is fundamentally different from the way a normal user performs these tasks.

The operating system of choice of many hackers is always an open source operating system and most of the time it is Linux. Apart from being free and open source, it is more secure and stable than many other operating systems. With the proprietary software whose source code is not made available, there is always a danger that the programmers might have left some backdoor in their software so as to exploit it at their will when desired.

It is this reason that hackers and information security community tends to use Free and Open Source Software. Indeed, most of the tools used in the world of hackers and information security specialists are Free and Open Source. They can themselves see the source code, audit it for any vulnerabilities and loopholes left there, and then can use it for the purpose they like it. And it is for these reasons that one important motto of hackers and information security specialists is that source code should be open and freely available.

Linux System and Network Administration for Hackers is a hands-on training course which is meant to teach the participants all what is needed to effectively use Linux for purposes of penetration testing and information security. A tentative outline of the content to be covered during the training session is provided below.

This training is meant for general enthusiasts with some knowledge of computers and operating systems, computer science and engineering students, professionals and researchers. Those who already work in the field of information security but still have not tested what Linux is, would benefit most from this training as it will introduce them to a new avenue of hacking and that of Free and Open Source Software.

Training Content

Main contents of this course are as following:

Introduction To Linux

  • History of Unix
  • Unix Flavors
  • History of Linux
  • Linux Distributions
  • Linux Vs. Windows
  • Open Source Movement
  • How are Hackers and Open Source Related

Installation And Configuration

  • Planning Installation
  • Linux Partitions
  • disk druid
  • fdisk
  • Text and GUI based installations

System Directories

  • System Packages
  • User Packages
  • Libraries

Linux Command Set

  • Basic Commands
  • Intermediate Level Commands
  • Advanced Commands

Boot And Shutdown

  • Boot Process
  • Run Levels
  • Start up Scripts
  • Shutdown Options

Handling X Window

  • XFree86 System
  • XF86Config
  • XConfigurator

Linux File System

  • Block Devices
  • File Systems
  • Mount and Mount Points
  • File System Security

User Management

  • User Addition and Deletion
  • User Properties
  • Security and Permissions

System Management

  • Archiving Strategy
  • Archiving Tools
  • Package Maintenance

Compiling and Building Kernel

  • Kernel Configuration
  • Building the Kernel
  • Kernel Installation

Network Servers Installation and Administration

  • Apache Web Server
  • BIND Domain Name Server
  • Sendmail Mail Server
  • Samba
  • NFS
  • NIS
  • DHCP
  • Squid
  • FTP

Shell Programming

  • Creating and Executing Shell Programs
  • Variables
  • Parameters
  • Iterative Statements
  • Conditional Statements

Linux Network Programming

  • Sockets
  • Socket Programming
  • Building a TCP Client

System Security

  • Security Plan
  • Tools
Trainer: To Be Decided
Profile of the trainer will go here.




Main Sponsor

Sponsor     Sponsor

Sponsor     Sponsor
  © CHASE 2006-2009,