Monthly Archives: August 2015

//August

Kali Linux on Android using Linux Deploy

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Getting Kali Linux to run on ARM hardware has been a major goal for us since day one. So far, we’ve built native images for the Samsung Chromebook, Odroid U2, Raspberry Pi, RK3306, Galaxy Note 10.1, CuBox, Efika MX, and BeagleBone Black to name a few. This however does not […]

By |August 17th, 2015|Papers|

Kali Linux Full Disk Encryption

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

As penetration testers, we often need to travel with sensitive data stored on our laptops. Of course, we use full disk encryption wherever possible, including our Kali Linux machines, which tend to contain the most sensitive materials.

Setting up full disk encryption with Kali is a simple process. The Kali installer […]

By |August 17th, 2015|Papers|

Passing the Hash with Remote Desktop

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Kali Linux contains a large number of very useful tools that are beneficial to information security professionals. One set of such tools belongs to the Pass-the-Hash toolkit, which includes favorites such as pth-winexe among others, already packaged in Kali Linux. An example of easy command line access using pth-winexe is […]

By |August 17th, 2015|Papers|

OpenVAS Vulnerability Scanning..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Vulnerability scanning is a crucial phase of a penetration test and having an updated vulnerability scanner in your security toolkit can often make a real difference by helping you discover overlooked vulnerable items. For this reason, we’ve manually packaged the latest and newly released OpenVAS 8.0 tool and libraries for Kali […]

By |August 17th, 2015|Papers|

Difference between 2G, 3G, 3.5G, 4G..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

 

www.extremehacking.org
CEHv8 CHFIv8 ECSAv8 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE,Certified Ethical Hacking, Center For Advanced Security Training in India,IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune

By |August 17th, 2015|Papers|

Android secret codes…

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

 

www.extremehacking.org
CEHv8 CHFIv8 ECSAv8 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE,Certified Ethical Hacking, Center For Advanced Security Training in India,IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune

By |August 17th, 2015|Papers|

Taking windows 7 down with a simple shortcut file!

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

In this tutorial, I will show you how to use a simple shortcut file to crack a windows 7 computer.

Cracking into a computer can be useful for a number of reasons: it can give you access to the rest of the network, you can use it as a proxy to […]

By |August 16th, 2015|Papers|

XSS ATTACKS in detail…

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Cross-site scripting attacks (CSS-XSS)

Note 1: This tut requires only basic knowledge of HTML, javascript and
php.

Note 2: Of course which language you will use to exploit the
vulnerability
on your “thief” site is your choice… I use php…

1.Introduction
2.Finding vulnerabilities
3.Exploiting vulnerabilities
4.Protecting your site

—-1.Introduction—-

CSS attacks are the easiest attacks one can use to attack a […]

By |August 16th, 2015|Papers|

MySQL Injection in Detail..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

 

INTRO!!
In this tutorial, I will demonstrate the infamous MySQL injection in newbie perspective so that all the newbies become able to become successful SQL injector. But, be sure to check various php & mysql functions in various sites which will help you a lot…  Now lets begin our walkthrough of […]

By |August 16th, 2015|Papers|

Urgent opening for 20 CCNA Certified Candidates for MNC

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

 

We have Urgent opening  for 20 CCNA Certified Candidates for MNC.

Please mail your updated Resume on placements@arizonainfotech.com .

In subject line of mail while sending your resume mention “For CCNA – fresher”

Contact :- 9325534460

Job-Description :-

Must be CCNA Global Certified.
Must posses very good Communication Skill.
Must be […]

By |August 16th, 2015|job|