• About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Events Page >
      • YCMOU
    • My Gallery >
      • News Gallery >
        • आपलं महानगर
        • देशदूत
        • दैनिक दिव्य मराठी
        • दैनिक गांवकरी
        • लोकमत
        • पुढारी
        • सकाळ
        • Tarun Bharat
        • Lokmat Times
        • The Nashik Herald
        • दैनिक लोकनामा
      • Radio
      • Television
      • Past Events >
        • FDP STTTP
        • PPDC
        • GCEKarad
        • KVIC
        • Kopykitab
        • Chandori
        • DACOE
        • Sanjivani Boot Camp
        • Pune Vidyarthi Griha's College of Engineering, Nashik
        • Fake News
        • Government Polytechnic
    • Tanmay's Initiative >
      • AI Digital Content Creation >
        • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Internship >
      • Industry Profile
      • Offer Letter >
        • Internship Attendance
        • Tasks List
  • Cyber Officers
    • Group Batch
  • Products
    • The Age Identifier
    • Secure Message ​Angel
    • Cyber Crime Case Studies >
      • Domain Hijacking Explained – Real Startup Case Study
    • Tools >
      • 1
      • 2
      • 3
    • Basics Knowledge >
      • Types & Skills of Hackers – Cyber Sanskar
      • WIFI
      • AI Bug Bounty
      • Hidden Protect Plus
      • Master Digital Forensics
      • Incident Response & Cyber Crime
      • Data Rescue Techniques for Effective Recovery
    • Blog
  • Contact Us
  • Join Internship
    • Intern session
Cyber Sanskar
  • About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Events Page >
      • YCMOU
    • My Gallery >
      • News Gallery >
        • आपलं महानगर
        • देशदूत
        • दैनिक दिव्य मराठी
        • दैनिक गांवकरी
        • लोकमत
        • पुढारी
        • सकाळ
        • Tarun Bharat
        • Lokmat Times
        • The Nashik Herald
        • दैनिक लोकनामा
      • Radio
      • Television
      • Past Events >
        • FDP STTTP
        • PPDC
        • GCEKarad
        • KVIC
        • Kopykitab
        • Chandori
        • DACOE
        • Sanjivani Boot Camp
        • Pune Vidyarthi Griha's College of Engineering, Nashik
        • Fake News
        • Government Polytechnic
    • Tanmay's Initiative >
      • AI Digital Content Creation >
        • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Internship >
      • Industry Profile
      • Offer Letter >
        • Internship Attendance
        • Tasks List
  • Cyber Officers
    • Group Batch
  • Products
    • The Age Identifier
    • Secure Message ​Angel
    • Cyber Crime Case Studies >
      • Domain Hijacking Explained – Real Startup Case Study
    • Tools >
      • 1
      • 2
      • 3
    • Basics Knowledge >
      • Types & Skills of Hackers – Cyber Sanskar
      • WIFI
      • AI Bug Bounty
      • Hidden Protect Plus
      • Master Digital Forensics
      • Incident Response & Cyber Crime
      • Data Rescue Techniques for Effective Recovery
    • Blog
  • Contact Us
  • Join Internship
    • Intern session
Cyber Sanskar is a firm which came into existence in January 2022 , but Dr Tanmay S Dikshit is performing this 17th Sanskar the new age Sanskar, from past fifteen (15) years judiciously ! This firm is ISO Certified, MSME Registered firm which basically handles AI & ML Base Secure Application Development projects. The logo and the name speaks louder than any word but still people have been asking about Why have we chosen "Cyber Sanskar" as company's name ? The Answer to this question is..  Cyber refers to the computer, information technology, & virtual reality cultures, but sanskar is a highly powerful word that originated in the Sanskrit language & has numerous connotations & extensive meanings. The term 'sanskar' has two primary interpretations. The first category is 'behavioural feature or attribute,' and the second category is 'rites and rituals associated with many religions & mythologies.' From the developing bud in the womb of a mother to the adult, responsible citizen, Sanskar, or sacraments, play a significant role. Considering this, cybersanskar is an unavoidable sanskar in the new modern world.
Tanmay S Dikshit
AICTE Training and Learning (ATAL) Academy Faculty Development Program
​👨‍🏫 Trainer : Mr. Tanmay S Dikshit, Founder of Cyber Sanskar

​Applications of Advanced Computing in Cyber Security and Forensic Science

📍 Online Venue : Department of Computer Applications, GHRCEM Jalgaon 📅 Date : 20 - 8  - 2025

​AI for Cyber Security : Fundamentals, Applications, and Hands-on Implementation

📍 Venue : Prathyusha Engineering College, Aranvoyalkuppam, Chennai, Tamil Nadu 📅 Date : June 18, 2025
​

🎯 Faculty Learning Outcomes :
  • Build a strong foundation in cybersecurity teaching & mentoring
  • Hands-on with digital forensic tools and cyber incident workflows
  • Real-time experience with malware analysis and AI-based security approaches
  • Enable student career guidance, research participation & curriculum integration
  • Learn how to collaborate for cyber security Center of Excellence initiatives & MoUs 

🕘 Session 1 : 9:30 AM – 1:00 PM Theme : Digital Forensics and Incident Response – Hands-on Practical's
​
🕑 Session 2 : 2:00 PM – 5:00 PM Theme : AI-Based Malware Detection & Website Security Tools
ex_files.zip
File Size: 201414 kb
File Type: zip
Download File

AI for Digital Forensics and Incident Response by Tanmay S Dikshit

🕙 Hands-on practical 3
​

🔍 Live Virus Scanning & Malware Analysis using VirusTotal
"We are learning Live Virus Scanning and Malware Analysis using VirusTotal to identify and understand malicious files and URLs. This helps us detect threats in real time, analyze malware behavior, and strengthen system defenses—an essential skill in any cybersecurity toolkit."

🦠 Virus Scanning & Malware Analysis
  1. What do hackers and cybercriminals do ?
    • Many times, knowingly or unknowingly, hackers try to access your mobile, tablet, laptop, or any digital device.
    • They may want to steal your data, spy on you, or disturb your system.
  2. How do they try to hack your device ?
    • By sending a file or link through:
      • Email
      • Bluetooth / Wi-Fi sharing
      • Suspicious apps (like APK files)
      • RF or transfer tools
  3. What type of files do they send ?
    • They may send:
      • Photo, audio, video, or document
      • An EXE file, APK file, or a zip file
    • These files often have spyware or malicious code secretly attached.
  4. What happens when you open the file ?
    • If you download or open the file:
      • A hidden background script/code runs
      • It starts doing suspicious activities like:
        • Recording your screen
        • Stealing passwords
        • Activating your microphone or camera
      • This is called a "compromise" of your device
  5. How to stay safe ?
    • Do not open unknown or untrusted attachments
    • If you receive any file, always scan it before opening
  6. How to scan a file safely online ?
    • You can use trusted online scanners like:
      • 🔗 https://www.virustotal.com
      • 🔗 https://www.hybrid-analysis.com
      • 🔗 https://www.metadefender.com
  7. How does it work?
    • When you upload a file, these websites :
      • Check if that file has been scanned before using its digital hash value
      • Scan it using multiple antivirus engines
      • Tell you if any antivirus finds it dangerous or suspicious
  8. Why multiple antivirus scans are better ?
    • One antivirus may miss the malware,
    • But another may detect it — that's why online platforms use 30+ antivirus engines together.
  9. What else do these tools show ?
    • File behavior (What it tries to do after opening)
    • Whether it connects to unknown IPs or sends out data
    • If it tries to install spyware or ransomware
  10. What is this whole process called ?
    • This is known as :
      • Virus Scanning
      • Malware Analysis
      • Threat Detection

🔑 Key Takeaway“ : If you ever receive a file — scan it first on VirusTotal or similar websites before you open it. This can save you from spyware, hacking, and digital fraud.”

🧰 Popular Free Online ScannersWebsiteUse CaseVirusTotal.comMost popular, fast scan
Hybrid-Analysis.comDeep malware behavior report
MetaDefender.comPrivacy-safe, enterprise use
Jotti.orgQuick multi-antivirus scan

🎯 Example for Training Purpose :
"You receive a file named Invoice_2025.exe on email. Before opening it, you upload it to VirusTotal. It shows 15 out of 70 antivirus engines detected it as Trojan : Spyware. You now know it’s fake and don’t open it. Your device is safe."
🕙 Hands-on practical 4
​

🔍 File Extension Mismatch Case

🕵️‍♂️ How Criminals Hide Data by Changing File Extensions
  1. What do criminals do ?
    • Cyber criminals try to hide important files
    • Instead of using any special app, they just change the file extension
      • Example: .jpg file is renamed as .mp3
      • So it looks like a music file, but it’s really an image
    • Because of this, the file looks harmless and you may skip it

  2. Why is this a problem ?
    • If you only check the file name or icon, you may miss important evidence
    • You may think it’s a normal file — but it could be a hacked document, image, or tool
      ​

  3. How can we detect the real type of the file ?
    • Every file has something called a File Signature or Magic Number
    • This is found in the binary code at the beginning of the file
    • This binary code tells us :
      ✅ What type of file it really is
      ✅ Which application made it
      ✅ Whether it has been modified or hidden

  4. What is the solution ? – Digital Forensics Technique
    • Use a Forensic Software Tool (like FTK Imager, Autopsy, X-Ways, etc.)
    • Open the file inside the tool and check its binary view (called Hex view)
    • Check the first few bytes of the file – this shows its real signature

  5. Example of File Signatures :
    File Type     Extension              File Signature (Hex)
    JPEG            .jpg                          FF D8 FF E0
    PDF             .pdf                          25 50 44
    PNG            .png                         89 50 4E 47
    ZIP              .zip                          50 4B 03 04

  6. What can you learn ?
    • Even if a file looks like a video, it may actually be a document or tool
    • Even if the name is changed, the file signature never lies
    • Learning to read and match file signatures helps you:
      • Find hidden evidence
      • Catch manipulation
      • Prove that someone changed the file intentionally

🎯 Key Takeaway "A file’s extension can be changed — but the digital signature inside cannot be hidden. That’s why forensic tools are your best friend!"

🧪 Class Activity Idea (For Hands-on Demo) :
  1. Rename a .jpg image as .mp3 on screen
  2. Try to open it — system gives an error
  3. Open the same file in Hex Editor or Forensic Tool
  4. Show students the magic number FF D8 FF and explain it is a JPEG
  5. Show how forensic tools detect real type even when the name is fake
hw_v680.exe
File Size: 18864 kb
File Type: exe
Download File

photo.zip
File Size: 4840 kb
File Type: zip
Download File

pktitlesong.mp3
File Size: 11 kb
File Type: mp3
Download File

secret.jpg
File Size: 11 kb
File Type: jpg
Download File

https://www.garykessler.net/library/file_sigs_GCK_latest.html
secret.txt
File Size: 0 kb
File Type: txt
Download File

🕙 Hands-on practical 5
​

🔍 Live Data Recovery Practical from USB / SD / HDD Devices
"We are learning Data Recovery to understand how deleted or lost files can be retrieved from USB drives, SD cards, and hard disks. This is a critical skill in digital forensics and cyber investigations, helping us recover valuable evidence and prevent data loss."

​🕵️‍♂️ Cloning Storage Devices at a Crime Scene
  1. What do we find at a crime scene ?
    At a cybercrime scene, we may find different storage devices such as:
    • Floppy Disks
    • CDs/DVDs
    • Pen Drives
    • Internal or External Hard Drives
    • Memory Cards (like microSD)
    These devices might contain important digital evidence.

  2. Why do we need to clone these devices?
    We should never work directly on the original evidence.
    Instead, we create an exact copy, called a clone, using forensic software. This keeps the original device safe and untouched.

  3. What is cloning in forensics ?
    Cloning means copying the entire storage device — from sector to sector and cluster to cluster — from start to end. It captures:
    • All current files
    • Deleted files
    • Hidden data
    • Even empty spaces that may contain old or overwritten data

  4. Why is cloning important ?
    • If we open or modify the original device, we may lose or overwrite hidden data.
    • Even empty-looking areas may still have traces of old files.
    • Once overwritten, real evidence may be lost forever.

  5. What is the process ?
    • First, clone the original device.
    • Keep the original safe (for court use).
    • Use the cloned copy for :
      • Making more copies (if needed)
      • Investigating, recovering files, and analysis
      • Sharing with authorized officers for examination
        ​

  6. Court Guidelines:
    • The original device is submitted to the court as primary evidence.
    • The cloned copy is used by forensic teams for testing and analysis.

🧠 Easy to Remember Tip : "Never touch the original. Always work on a clone."

🔍 Real-life Example :
Imagine you find a pen drive at a cybercrime scene. You don’t open it directly on your laptop. Instead:
  • You create a forensic clone
  • The original is kept safe (like gold!)
  • You use the clone for checking files, recovering deleted data, etc.

📌 In Summary :
  • Digital evidence can be found in many devices.
  • Always create a bit-by-bit clone using forensic tools.
  • Original = Protected for court
  • Clone = Used for investigation​​
🕙 Hands-on practical 6

🔍 Creating Forensic Report using Autopsy​
"We are learning how to create forensic reports using Autopsy because it allows us to document digital evidence in a structured and legally acceptable format. This skill is essential for presenting findings in cyber crime investigations and professional forensic analysis."

🗂️ Recovering and Tagging Digital Evidence
  1. What do we start with ?
    We usually have a cloned image of a storage device (like a hard disk or pen drive).
    We never work on the original – we work on the forensic image (clone).

  2. Opening the image in forensic software :
    We use forensic tools (like Autopsy, FTK, or X-Ways) to open this cloned image.
    These tools allow us to :
    • Browse through all files
    • View deleted, hidden, or modified files
    • Find any documents, photos, videos, or emails related to the crime

  3. What is our main goal ?
    • To search and identify files that are related to the crime
    • It could be a threatening letter, fake ID, leaked data, illegal photos, chat logs, etc.

  4. Once we find the files – we recover them :
    • The tool helps us recover (restore) the file
    • We can view what’s inside it
    • It shows where it was saved, when it was created, last modified, etc.

  5. What is tagging and bookmarking ?
    • After we recover a file, we tag or bookmark it inside the forensic tool
    • Tagging means: "This file is important!"
    • It helps us quickly find it later while making the report

  6. Why is this tagging useful ?
    • While generating the final forensic report, all tagged evidence is listed clearly
    • The report will show:
      • Where the file was found (exact folder path)
      • When it was created and modified
      • File type, size, and value in the case
        ​

  7. Real Example :
    Let’s say you find a file named plan.docx
    • You open and read it – it’s a threat letter
    • You recover it
    • Then you tag it as “Main Evidence - Threat Document”
    • Later, your report will say:
      "plan.docx was found in path X, created on 12-April-2025, recovered and marked as criminal evidence."

🧠 Key Takeaway : First we find the file → then recover it → then tag it → then report it.
📌 In Summary :
  • Open cloned image in forensic tool
  • Search and recover files related to the crime
  • Tag/bookmark them for reporting
  • Report shows where, when, and what the file is – helping in legal case
🕙 Hands-on practical 7
Live Demo : Network Traffic Analysis using Wireshark
"We are learning Network Traffic Analysis because it gives us essential skills that are highly relevant in today’s digital world. It helps us monitor, secure, and optimize network systems in real-life scenarios, and opens doors to a meaningful career in cybersecurity."

🌐 Network Protocol Analyzer
  1. What happens when we use the Internet?
    • Every time we open a website, send an email, or use any app — data is sent and received through the internet.
    • This data travels through our network (Wi-Fi, LAN, etc.) in the form of packets.

  2. What if something suspicious happens ?
    • If someone is trying to hack or spy on your network
    • Or if there is unusual activity happening (like unknown connections),
    • We need a way to watch and capture that data.

  3. What is a Network Protocol Analyzer ?
    • It is a tool used to capture and analyze the data packets moving across a network.
    • It helps us see what’s going in and out of our system through the internet.
    • Example tools: Wireshark, Tcpdump, NetworkMiner

  4. How does it work ?
    • It reads raw binary data that flows through the network (from LAN cable or Wi-Fi)
    • Even though data is encoded or compressed, the tool can decode it
    • It shows you detailed information like:
      • Source and Destination IP
      • Protocol used (like HTTP, FTP, DNS, etc.)
      • What was sent or received
      • Which website or app was contacted
      • Whether any malware or unauthorized access happened

  5. Why is this important ?
    • For network security monitoring
    • To check if someone is trying to hack, sniff, or misuse your network
    • To collect evidence during cyberattacks
    • It helps in cybercrime investigations

  6. Where should we install it ?
    • It should be installed at a network point where your internet enters — like the router, server, or gateway system
    • This helps us capture all traffic going in and out of the network
      ​

  7. Real-Life Use Case :
    Suppose someone tries to steal data from your office network:
    • A network protocol analyzer can capture those packets
    • Show what data was accessed
    • Who accessed it, from which IP, and at what time
    • You can use this as digital evidence

🔑 Key Takeaway :
A Network Protocol Analyzer helps us see, analyze, and capture everything happening on our network — especially useful in case of suspicious activity or cyberattacks.

📌 In Summary :
  • Data on the internet travels in packets
  • Protocol analyzers help us read and analyze those packets
  • Useful for detecting hacking, malware, or spying
  • Can be used to collect evidence in cybercrime cases
wireshark-win64-1.12.3.exe
File Size: 29826 kb
File Type: exe
Download File

🕙 Hands-on practical 8
​

🔍 SMS Header Analysis Practical​
"We are learning SMS and Email Header Analysis to trace the origin of messages, identify forged senders, and detect suspicious activity. These techniques are vital in cyber investigations, helping us uncover digital footprints and prevent fraud."

📩 Fake Messages, SMS Forensics & Link-based Hacking
  1. What are bulk messages ?
    • You receive many messages on your mobile. Some are:
      • Promotional (from companies or brands)
      • International Bulk SMS (offers, deals, etc.)
      • Some are Fake or Suspicious messages from unknown sources

  2. How do hackers misuse this system ?
    • Criminals or hackers use bulk messaging tools to send:
      • Fake job offers
      • Lottery winnings
      • Account verification alerts
      • “Free Recharge” or “Loan Approved” messages
    • These messages often have dangerous links inside.

  3. What happens if you click on such links ?
    • As soon as you click:
      • Your phone might get hacked
      • Spyware or trojan may get installed
      • Your personal data, photos, passwords may be stolen
      • You may be redirected to a fraudulent website

  4. How to verify a message ?
    You must check:
    • 📍 From where the message is sent (Location or country)
    • 🏢 Which service provider sent it (Jio, Airtel, Vodafone, etc.)
    • 📂 What category it belongs to (Promotional / Transactional / Scam)
    • 🌐 If it contains a suspicious link, never click it

  5. How to trace the message source ?
    • There are online tools and mobile forensics techniques to check:
      • Message header
      • Sender ID
      • Server & location of origin
    • Some apps & websites can tell if it’s a real or fake bulk sender

  6. What is phishing by SMS called ?
    • This is called Smishing (SMS + Phishing)
    • It tricks you into clicking a link or giving personal details
    • Mostly used by cybercriminals to access your data or money

  7. Signs of a suspicious message :
    • Message says “Your KYC will expire today, click here!”
    • Message asks “You have won ₹10 lakh – click to claim!”
    • Message comes from a short random number or international code
    • Spelling mistakes or urgent tone
      ​

  8. How to stay safe :
    ✅ Never click on unknown links in SMS
    ✅ Block and report such numbers
    ✅ Use a mobile antivirus or SMS scanner app
    ✅ Always verify the sender with your bank/company directly

🛡️ Key Takeaway"If you get any SMS with links or urgent warnings — stop, check, verify before you click. Many cyber attacks start from just one SMS!"

🔍 Useful Free Tools (For Trainers & Analysts) :Tool / MethodUseTruecaller / GetcontactIdentify unknown senders
SMS Header AnalysisSee SMS source, route, provider
VirusTotal URL scanCheck if the link is harmful
Android log tools (ADB)Deep mobile forensic tracking

🎯 Example for Class Use :
Student receives an SMS: "Your SIM will be blocked today. Click here: bit.ly/fakeupdate"
Trainer shows how to copy the link, paste in VirusTotal, and scan it — it shows 8 antivirus tools flag it as malicious
🕙 Hands-on practical 8
​

🔍 Hands-on : Virus Creation
"We are learning about Virus Creation to understand how attackers disguise malicious files. This hands-on session helps us recognize deceptive techniques used in real-world cyber threats and strengthens our ability to detect and prevent them."

✅ What is a Virus in Computers ?A computer virus is a type of malicious software (malware) that is designed to spread from one device to another and to damage, steal, or change data without the user’s permission.

​🧠 How Does a Virus Work? (Step-by-step)
  1. Attachment Phase
    • The virus attaches itself to a normal file, software, email attachment, or document.

  2. Execution Phase
    • When you open or run that infected file, the virus becomes active in your system.

  3. Replication Phase
    • The virus starts to copy itself into other files or folders in your system, or even other devices connected to the same network.

  4. Payload Phase (Harmful Activity)
    • The virus starts doing damage like:
      • Deleting files
      • Slowing down the system
      • Stealing data
      • Showing unwanted popups
      • Giving remote access to hackers

💡 Types of Computer Viruses (Simple)
Type  What it does
File Infector  Attaches to .exe or program files
Macro Virus  Affects documents like Word or Excel
Boot Sector  Damages the system start-up process
Trojan Horse  Looks like a safe file but is very dangerous
Ransomware  Locks files and asks for money (ransom)
Worm  Spreads rapidly over the network
Spyware  Secretly steals your data

🛡️ How to Stay Safe from Viruses?
  1. Do not open unknown email attachments
  2. Avoid downloading software from untrusted websites
  3. Use antivirus software and keep it updated
  4. Scan USB drives before opening
  5. Always update your operating system

​✅ What is Backdoor Script or Batch Script via Notepad ? A Backdoor Script is a small piece of malicious code written in Notepad (using extensions like .bat, .vbs, or .html) that can:
  • Control the computer remotely
  • Steal data
  • Open ports for hackers
  • Shut down, restart, or delete files from the system
  • Act as spyware or keylogger
    ​

1. Basic Batch Virus (.bat file)
@echo off  
:Start  
start notepad  
goto Start​
➡️ Opens unlimited Notepad windows until system hangs.

2. Delete System Files (DANGEROUS!)
del C:\Windows\System32 /f /s /q
➡️ Can destroy your operating system (used maliciously).

3. VBScript to Show Fake Messages
x=msgbox("You are hacked!", 0+16, "Warning")
​
​💻 Where is it Used in Real Cyber Crime?
  • Used in social engineering attacks
  • Hidden inside games, songs, or image downloads
  • Sent via email attachments
  • Used in school and college prank viruses
  • Can be part of backdoor access to systems

🛡️ How to Stay Safe?
  1. Do not run unknown .bat, .vbs, or .exe files
  2. Keep your antivirus active and updated
  3. Be cautious while downloading from unknown websites
  4. Scan USB drives or pen drives before opening files
  5. Learn basic coding to identify what scripts actually do
🕙 Hands-on practical 9
🔍 Using Keylogger & Anti-Keylogger – Investigation vs Protection
"We are learning how Keyloggers work and how Anti-Keyloggers defend against them. This demo helps us understand both sides—how attackers capture keystrokes and how investigators detect them—making it vital for both offensive and defensive cybersecurity strategies."
​We are learning this topic to understand how real-time keystroke encryption strengthens our digital security by preventing data theft from keyloggers, a critical measure in protecting personal and organizational information

​🛡️ Anti-Keylogger Tools – To Protect Against Keyboard Spying
  1. What is a Keylogger?
    • A Keylogger is a small hidden software (or tool)
    • It records everything you type on your keyboard
    • Example: your passwords, bank account numbers, private emails, etc.

  2. How does a Cybercriminal use it?
    • Hackers may send you a file or trick you into installing something
    • Once installed, the keylogger secretly runs in the background
    • Whatever you type (login details, messages, OTPs) is sent directly to the hacker
    • Your data is stolen without you knowing

  3. Why antivirus sometimes fails?
    • Some keyloggers are new or modified, so your antivirus may not detect them
    • They work silently and can bypass weak security systems

  4. What is Anti-Keylogger software?
    • It is a special tool that protects your typing activity
    • Even if a keylogger is installed, the Anti-Keylogger will send fake keystrokes
    • This means:
      ✅ Hacker receives wrong information
      ✅ Your original password stays safe
      ✅ Your system remains secure

  5. How does this help?
    • It confuses the hacker
    • It protects sensitive information like:
      💳 Bank details
      🔐 Login credentials
      🏢 Company confidential documents
    • It also alerts you if something suspicious is being typed or captured

  6. Examples of Anti-Keylogger Software:
    • Zemana AntiLogger
    • Ghostpress
    • SpyShelter
    • Oxynger KeyShield
  7. 🔒 Important Reminder for Students : Always be careful before opening unknown files or clicking on strange links.
    Use trusted anti-keylogger tools especially on company devices or personal laptops with sensitive data.

    📘 Quick Recap:
  8. Keylogger = Software that records your keyboard activity
  9. Hacker can steal passwords, OTPs, or private chats
  10. Anti-Keylogger = Sends fake data to confuse the hacker and keeps you safe
keyscrambler_setup.exe
File Size: 1283 kb
File Type: exe
Download File

Keylogger Simulation Tool ​"Why are we learning this topic? Because it helps us understand how keyloggers work in a safe, controlled environment, allowing us to test and evaluate the effectiveness of antivirus and anti-keylogger software—an essential skill in today’s cybersecurity landscape."

​👨‍👩‍👧‍👦 Parental Control & Keylogger
  1. Why is this needed ?
    • When a child is very young, they don’t know what is right or wrong
    • They may use the internet or phone without understanding the risk
    • Parents want to make sure the child is not watching bad content
    • Or not talking to strangers who may be dangerous

  2. What is Parental Control ?
    • These are special apps or software that help parents:
      ✅ See what the child is doing on their device
      ✅ Block certain websites or apps
      ✅ Set time limits for screen usage
      ✅ Get alerts if the child visits suspicious pages

  3. What is a Keylogger ?
    • A keylogger is a tool that records everything typed on the keyboard
    • Example: If the child types “Facebook” or “I am alone at home”, it gets saved
    • It can help parents know if the child is chatting or searching something unsafe

  4. What more can these tools do ?
    • Some apps also take screenshots of the mobile or computer
    • These screenshots help parents see what’s happening on screen
    • It’s like a recording of child’s activity

  5. Good Examples of Parental Control Apps :
    • Google Family Link
    • Qustodio
    • Net Nanny
    • Norton Family
    • Kaspersky Safe Kids
      ​

  6. Important Note for Students :
    • These tools are not for spying — they are for safety
    • Parents use them because they care about you
    • As you grow older, you’ll learn to use the internet responsibly

🎯 Key Takeaway"Parental Control tools and keyloggers help protect children from online dangers — not to punish, but to guide them on the right path."

🧪 Classroom Activity Idea:
  1. Show a demo (with permission) of Google Family Link dashboard
  2. Show how websites can be blocked or time set
  3. Explain how keyloggers capture typed text and how it can help in child safety cases
key-logger test_program.exe
File Size: 310 kb
File Type: exe
Download File

🕙 Hands-on practical 10
​
🔍 Malware Behavior Analysis using Portable Tools
"We are learning about portable tools because they equip us with essential, hands-on skills that are highly relevant for cybersecurity, digital forensics, and IT management. These tools allow us to respond quickly, work efficiently without installation barriers, and analyze malware behavior directly in real-world scenarios."

​🧰 Live Forensics using Portable Tools – Quick Evidence Collection
  1. What is Live Forensics ?
    • Live forensics means collecting digital evidence from a running system
    • It is done without shutting down or disturbing the system
    • Useful when you want to know what is happening right now

  2. When is it used ?
    • If you think some suspicious activity has happened recently
    • During cybercrime investigations, when you have limited time
    • If you want to avoid losing data stored in RAM or temporary files

  3. What are Portable Tools ?
    • These are special tools that do not need to be installed
    • They can run directly from a USB pen drive
    • They don’t write anything to the suspect system’s hard disk

  4. Why is this important ?
    • Helps to collect evidence quickly
    • Reduces the risk of tampering with original data
    • Keeps the integrity of evidence safe and court-admissible

  5. How to Prepare ?
    • Create a Forensic USB Toolkit
    • Load it with important tools like:
      🔹 FTK Imager (for memory and disk capture)
      🔹 WinAudit (for system info)
      🔹 USBDeview (for USB activity)
      🔹 NirSoft tools (for network & browser history)
      🔹 DumpIt (for memory dump)
    • Keep the pen drive write-protected, if possible

  6. Benefits :
    ✅ Collects live data without delay
    ✅ Captures RAM content (chat, passwords, running processes)
    ✅ Saves important log files, system snapshots
    ✅ No installation needed, so no trace left behind
    ​

  7. Risks to Handle Carefully :
    ⚠️ Running tools on a suspect system may accidentally change some files
    ⚠️ So, always use trusted portable versions
    ⚠️ Maintain a chain of custody for legal acceptance

💡 For Training & Demo : You can show students how to run a simple portable tool like WinAudit or Process Explorer from a USB.
Explain how they can take a screenshot, export report, and save it securely.

📘 Quick Recap :
  • Live Forensics = Investigating an active (running) system
  • Portable Tools = Run from USB, no installation, quick evidence capture
  • Benefits = Fast, safe, and non-intrusive method to gather cyber evidence
mylastsearch.exe
File Size: 62 kb
File Type: exe
Download File

wifiinfoview_3.exe
File Size: 316 kb
File Type: exe
Download File

usbdeview.exe
File Size: 61 kb
File Type: exe
Download File

browsinghistoryview.exe
File Size: 470 kb
File Type: exe
Download File

winauditu.exe
File Size: 1123 kb
File Type: exe
Download File

wirelesskeyview.exe
File Size: 263 kb
File Type: exe
Download File


wfa.exe
File Size: 2160 kb
File Type: exe
Download File

1_thumbs.db
File Size: 5 kb
File Type: db
Download File


"We are learning this topic because it equips us with essential skills to effectively track, manage, and secure Microsoft software across an organization. This knowledge is highly relevant for ensuring license compliance, identifying risks, and maintaining audit and security standards in real-world IT environments."
msiasetup.exe
File Size: 3733 kb
File Type: exe
Download File

🕙 Hands-on practical 11
🔍 Official Cyber Crime Filing Demo on National Cyber Crime Reporting Portal
"We are learning how to officially file cyber crime complaints using the National Cyber Crime Reporting Portal. This empowers us to take legal action against online offenses and helps in promoting a safer digital environment for everyone."
🕙 Hands-on practical 12
​
🕑 4:00 PM – 5 : 30 PM
​

🛡️ How Cyber Sanskar Builds Real-Time Website Security Tools Using AI
"We are exploring how Cyber Sanskar builds real-time website security tools using AI to proactively detect threats, prevent attacks, and ensure continuous protection. Integrating AI into cybersecurity allows us to stay ahead of evolving digital risks with smart, automated solutions."


🔍 Live AI Project Demo : How Cyber Sanskar Handles Real Client Cases with Website Security AI
"We are learning from a live AI project demo to understand how Cyber Sanskar solves real client cases using AI-driven website security. This showcases how artificial intelligence can be practically applied to detect, prevent, and respond to cyber threats in real-world business environments."

​🤝 Academy / Organization Collaboration Models – How to Join or Start with Cyber Sanskar
"We are discussing collaboration models so that academies and organizations can join hands with Cyber Sanskar. This opens opportunities for joint training programs, MoUs, real-time projects, internships, and hands-on cybersecurity initiatives that benefit both students and institutions."
🕙 Hands-on practical 13
​
🕟 5 : 00 PM – 5 : 30 PM
🗣️ Interactive Q&A + Feedback Collection + Group Photo + Break
"This final session is a space for open interaction—ask questions, share your thoughts, and reflect on today’s learnings. Your feedback helps us grow, and the group photo will capture the spirit of collaboration we built today."
  • About Me
    • Awards & Recognitions
    • Tanmay's Information
    • Events Page >
      • YCMOU
    • My Gallery >
      • News Gallery >
        • आपलं महानगर
        • देशदूत
        • दैनिक दिव्य मराठी
        • दैनिक गांवकरी
        • लोकमत
        • पुढारी
        • सकाळ
        • Tarun Bharat
        • Lokmat Times
        • The Nashik Herald
        • दैनिक लोकनामा
      • Radio
      • Television
      • Past Events >
        • FDP STTTP
        • PPDC
        • GCEKarad
        • KVIC
        • Kopykitab
        • Chandori
        • DACOE
        • Sanjivani Boot Camp
        • Pune Vidyarthi Griha's College of Engineering, Nashik
        • Fake News
        • Government Polytechnic
    • Tanmay's Initiative >
      • AI Digital Content Creation >
        • AI Digital Content Creation
      • Know the Risks
      • Purification Social Media
      • Mastering Digital Citizenship & Safety
      • Career Enhancement Program
      • Cyber Investigator
      • Phone Detox
      • Mastering Streaming
      • Social Activities
    • Internship >
      • Industry Profile
      • Offer Letter >
        • Internship Attendance
        • Tasks List
  • Cyber Officers
    • Group Batch
  • Products
    • The Age Identifier
    • Secure Message ​Angel
    • Cyber Crime Case Studies >
      • Domain Hijacking Explained – Real Startup Case Study
    • Tools >
      • 1
      • 2
      • 3
    • Basics Knowledge >
      • Types & Skills of Hackers – Cyber Sanskar
      • WIFI
      • AI Bug Bounty
      • Hidden Protect Plus
      • Master Digital Forensics
      • Incident Response & Cyber Crime
      • Data Rescue Techniques for Effective Recovery
    • Blog
  • Contact Us
  • Join Internship
    • Intern session