Training Session on “Nmap, Passive Reconnaissance, and Hands-on CTF”
1st September 2025
Cyber security Club, Dronacharya College of Engineering, Gurugram, organized a comprehensive Training Session on “Nmap, Passive Reconnaissance, and Hands-on CTF” on 1st September 2025. The workshop was led and coordinated by student coordinators Mr. Abhishek Prasad, Mr. Aditya Singh, Mr. Praveen Rawat and Mr. Daksh Sharma from the Department of CSE (IoT & Cyber security), showcasing their leadership and technical capabilities. Aimed to enhance students’ knowledge of network reconnaissance, vulnerability discovery, and the emerging cybersecurity challenges associated with the Internet of Things (IoT).
The session began with Mr. Abhishek Prasad, who introduced the objectives of the workshop and provided an overview of both traditional network security and modern IoT security concerns. He emphasized how reconnaissance forms the backbone of any cybersecurity assessment. Mr. Aditya Singh led a detailed demonstration on Nmap, and network scanning methodologies, explaining how to map a network, identify active hosts, and interpret results. His session highlighted how effective reconnaissance can uncover vulnerabilities early in a security evaluation. Mr. Praveen Rawat contributed by covering passive reconnaissance and host discovery, demonstrating how crucial data can be gathered from open sources without directly interacting with the target — a skill essential for ethical hackers and cybersecurity professionals. Mr. Daksh Sharma volunteered to ensure smooth coordination, managing technical setups and assisting participants throughout the session.
The workshop also delved into the security of IoT devices, where the team discussed how interconnected systems such as smart cameras, automation devices, and industrial sensors can be exploited if not properly secured. Students learned how weak passwords, misconfigurations, and outdated software often make these devices vulnerable to attacks. The trainers effectively connected network scanning and passive reconnaissance techniques to IoT vulnerability assessment, helping participants understand the real-world implications of poor device security.
In conclusion, the training session proved to be a valuable learning experience that successfully bridged theoretical understanding with real-world applications.