Xowia Technologies


AdvancedHackVenture Summer Camp in Gwalior

HackVenture Summer Camp Content

Ethical Hacking & Digital Forensics




Cyber Ethics

  • Hackers & Hacking Methodologies
  • Types of Hacker
  • Communities of Hackers
  • Malicious Hacker Strategies
  • Steps to conduct Ethical Hacking
  • Hiding your identity while performing Attacks


Basic Network Terminologies

  • TCP / IP Protocols
  • IP Addresses
  • Classes of IP Addresses
  • Proxies and VPN’s
  • SSH


Information Gathering & Foot Printing

  • Whois Information
  • Active / Passive Information Gathering
  • Information Gathering Using
  • Foot Printing Methodologies
  • Tools that aid in Foot Printing


Scanning & Enumeration

  • Why Scanning?
  • Types of Scanning
  • Tools to aid in Scanning
  • Nmap – Network Mapper
  • Banner Grabbing


Vulnerability Scanning

  • What is Vulnerability
  • Preparation for Scanning
    • Nessus Vulnerability Scanner
    • Nessus Configuration
    • Creating a Nessus Scan Policy
    • Running a Nessus Scan
    • Import Report
  • Acunetix Web Vulnerability Scanner
    • Acunetix Configuration
    • Create a Acunetix Scan Policy
    • Running a Acunetix Scan
    • Analyzing Results
    • Generating Report


Kali Linux

  • What is Kali Linux
  • Installation of Kali
  • Uses of Kali
  • What is Exploits
  • How Exploits Work
  • Information Gathering with Kali
  • How to Scan a Victim
  • Functionality of Kali


Metasploit Framework – Swiss Army’s Knife

  • What is Metasploit Framework
  • Introduction with Metasploit Interfaces
  • MSFConsole
  • Armitage
  • What are Payload, Auxiliary Modules, Shellcode, Listener
  • Difference Between Exploits and Payload
  • Exploiting Windows XP Machine
  • Brief Description of Meterpreter
    • Compromising a Windows XP Machine
    • Dumping Username and Passwords
    • Privilege Escalation
    • Keylogger
    • Dump Key logs
    • Or Much More
  • Armitage
    • What is Armitage
    • Finding Target through Armitage
    • Automatically Finding Payload or Exploits for Target Computer
    • Exploiting a Machine
  • Accessing Victim’s Computer Screen
  • Clearing Tracks and Foot Prints


Trojan and Backdoors

  • Binding Trojan with another File
  • How to Detect Trojan in your Computer
  • Removal of Trojan from your Computer
  • Analysis of Trojan/ Virus


Phishing & its Prevention

  • Making Phishing Pages
  • Detection of Phishing Pages


Password Cracking

  • Types of Password Cracking
  • How Password Crackers Work
  • Dictionary Based Attack
  • Brute Forcing Attack
  • OphCrack – Windows Password Cracker


Steganography and Cryptography

  • What is Steganography
  • How Steganography Works
  • Tools for Steganography
  • What is Cryptography
  • How Cryptography Works
  • Tools for Cryptography


Google Hacking

  • Understanding How Google Works
  • Power Of Searching
  • Google Basic Operators
  • Google Advanced Operators
  • Automated Google Tools
  • How to Find the Desired Website
  • How to Google can aid in searching Vulnerable Website


Web Hacking

  • Web Application Overview
  • Web Application Attacks
  • SQL Injection Attack
  • Cross Site Scripting
  • Tools for Attacking
  • Finding Admin Panel
  • Buffer Overflow in Web Apps
  • HTMLif
  • & More


Wireless Hacking & Security

  • Wireless Protocols
  • Wireless Routers-Working
  • Cracking Wireless Routers Password (WEP)
  • Securing Routers from Hacker
  • Tools for Wireless Hacking


Introduction to Cyber Crime Investigation & IT ACT 2000

  • Types of Cyber Crimes
  • Reporting Cyber Crimes & Incidences Response
  • Introduction to IT Act 2000 & its Section
  • Flaws in IT ACT, 2000

Registrations: Registration started for Summer Camp June'15. Scroll down for registration and more information.

HackVenture BootCamp Details

  • Summer Camp Starting Date: 01/June2015
  • Fees: 1500 INR
  • Registration:
    • Registration- 10-May'15 to 28-May'15
  • BootCamp Duration:7 Days
  • Program Benefits & Highlights:
    • Learn & Interact with renowned Industry Expert.
    • Receive an unparalleled education on the art of Computer security with personal one-on-one attention from us.
    • Hands on Demonstrations of Latest Hacking Techniques & Tools.
    • PowerPoint Presentation, Live Demos, Interactive Question & Answer Sessions and Comprehensive reading material.
    • Toppers of Workshop to be Personally Interviewed by us and will receive a chance to work with us on security projects.
  • Course Material & DVDs :
    • Comprehensive Camp Material will be provided to Participants.
    • Ethical Hacking Toolkit (DVDs and CD) (Containing Tools, Videos, EBooks, Presentations). 
  • Certification:
    • Certified “Certified Cyber Security Dabster” Provide by Xowia Technologies.
  • For Registration:
    • Xowia Technologies, Baba Complex, Infront of Ram Mandri, Phalka Bazar, Gwalior (Gwalior) or Call Us

    In Case of any other Details or Formalities on our end, do revert back to us or

    Web- http://www.xowia.com/

    Email: - xowiatech@gmail.com

    Ph. :-   0751-2459597 | +91 96170-38381


    Know about your trainer: Kapil Soni

                The lead trainer at Xowia Technologies is Kapil Soni. He is a renowned ethical hacker and security researcher from India. He is in top 60 InfoSec Researcher and Web Penetration Tester across the world (According to BugCrowd). Several times he is in newspapers due to his activities and work. He is a security analyst, penetration tester and trainer and he has great experiences in InfoSec field also he trained more than 1k students at different institutes.

                Also he supported and helped to secure many international companies like Amazon, Indeed, PagerDuty, HumbleBundle, Cisco, Avast, BlackPhone and many more.

                Some achievements of him are mentioned below-


                a) Developed a Network Scanner on Python

                b) Developed a Linux distribution namely “Blackistry”, especially for mobile security auditing and forensics.

                c) He is chief-editor of top 3, InfoSec tools providing website, www.toolwar.com


                a) Published his article on “Windows registry forensics” on #1 InfoSec magazine “Hakin9”.

                b) Published kindle book on “Windows Registry Forensics (WRF) with Volatility Framework”

                c) Published kindle book on “Advanced PDF Forensics and Analysis”