WhatsApp Image 2025-01-30 at 14.24.20_baf65857

Industry Hackathon ๐Ÿ“Œ๐Ÿ’ป๐Ÿ”ฐ @Sanjivani University

Congratulations to Team Innovators for securing 2nd place in the Industry Hackathon at Sanjivani University! ๐ŸŽ‰ Your project, AiDoc: Advanced Report Analysis and Diagnosis, showcased remarkable innovation in healthcare technology. Competing against top talent, you demonstrated exceptional problem-solving skills and teamwork, proving your potential to drive real-world solutions. This achievement is a testament to your hard work and passion for technology. Keep pushing boundaries and inspiring others! ๐Ÿš€๐Ÿ’ก

finalzzz

Webinar 2

A recent webinar organized by C-SAFE on ‘Web Attack Detection Using IDPS: A Robust Approach by Shivam L. Sir to Strengthen Cybersecurity Defenses.'”

Page 1: Cybersecurity Concepts
Tools and Techniques:
Wireshark and VS Code: Used for scripting and network analysis.
SQL: Primary language utilized for database interactions.
Common-client: Used within an Ubuntu environment for certain tasks.
Bypass Techniques:
Encoding:
HTML Encoding in developer mode.
Base64 Encoding.
SQL Injection:
Using SQL queries and comments to exploit vulnerabilities.
Converting Base64 to JavaScript for analysis and attacks.
Q&A: Most Harmful Attacks:
SQL Injection: A severe attack affecting database integrity and security.
Cross-Site Scripting (XSS): Can manipulate entire web applications through

Page 2: Intrusion Detection and Response
Network Analysis Workflow:
Involves several stages:

Packet Decode: Interpreting raw data packets.
Pre-Processor: Initial filtering and preprocessing of data.
Detection Engine: Identifying malicious activity using rules.
Logging: Recording detected threats for further analysis.
Rules are crucial for identifying potential threats in network traffic.

IDS Rule Example:
Example of an Intrusion Detection System (IDS) rule:
plaintext
Copy code
action: alert
protocol: tcp
source IP: any
source port: 23
destination IP: 192.168.12.8
destination port: any
msg: “TCP Packet is detected”
sid: 2000020
Tools:
CyberChef: Used for data encoding, decoding, and manipulation.
Wireshark: For following network streams and deep packet inspection.
regex101.com: A web-based tool for regular expression pattern matching.
Payload exploration using document.cookie to test vulnerabilities.

IMG_2341 (1)

๐Ÿ“Œ Swachhata Awareness @AshramShala

Today, students of the School of Engineering and Technology, including Cyber Security and AIDS students, successfully organized a Swachhata Pakhwada event, promoting the importance of cleanliness, hygiene, and sustainability at the Eklavya Adivasi Anudanit AshramShala, Takali, Kopargaon. The event featured a handwash demonstration and hygiene awareness activities, along with the distribution of hygiene kits and fruits (handwash, soaps, chocolates, etc.) to the students of the Ashram School.

A special appreciation goes to Saish Dhiwar and his organizing team for leading this initiative. We also extend our heartfelt thanks to Dr. Mahendra Gawali, HOD CSE, Dr. Vengatesan Krishnasamy, HOD AIDS, and Dr. Kalpana Joshi, the Event Coordinator, for their continuous support and guidance. Our appreciation also goes to the Dr. KavithaRani P. Dean, School of Engineering and Technology (SUSET), Pro Vice-Chancellor Dr. J Janet, and the President , Honorable Amit Dada Kolhe, Sanjivani University for their encouragement and unwavering support throughout this event.

____________________________________________________________________________________________________________