Monthly Archives: September 2015

Home » Archives for September 2015

Password Cracking Session Intro

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

We are going to start a new session on Password cracking, that will include all sorts of tech needed to break the password. It will be a sort of building block if you are planning to be CEH certified. CEH is one of the most powerful course around, but I […]

By |September 21st, 2015|Metasploit|

Windows 8 Remote Explorer Kill with Shell Code

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This post will elaborate how to take down a Explorer with help of shellcode. In CEH class we had created a dropper with exe extension, this is a more advance dropper that can be used to inject any process for the current example I have taken a explorer process.

The assembly […]

By |September 20th, 2015|Papers|

Inserting Fake Update DNS in Windows 8 through shellcode

 

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

This post will elaborate how to add a fake update DNS with help of shellcode. In CEH class we have already seen how metasploit can be used to make changes in DNS, this is a more advance dropper that can be used to inject any process for the current example […]

By |September 20th, 2015|Papers|

Windows 10 Remote Explorer Kill with Shell Code

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This post will elaborate how to take down a Explorer with help of shellcode. In CEH class we had created a dropper with exe extension, this is a more advance dropper that can be used to inject any process for the current example I have taken a explorer process.

The assembly […]

By |September 15th, 2015|Papers|

Secure your websites from DDOS attack in just one minute..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this article, I will teach you guys on how you could secure your websites from DDOS in just one minute.

 

Simply paste the following code below in your root directory:

<?php
/*
#####################################################
# Script: DDOS Security By Extreme Hacking #
#####################################################
*/

$ Ad_ddos_query = 10, / / ​​number of requests per second to detect DDOS attacks
$ […]

By |September 14th, 2015|Papers|

Secure your website just in one minute..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

In this article, I will teach you guys on how you could secure your websites in just one minute.

 

Simply create a file named as .htaccess and paste the following code below:

#####################################################
# Script: htaccess Security By Extreme Hacking #
#####################################################
# No web server version and indexes
ServerSignature Off
Options -Indexes
# Enable rewrite engine
RewriteEngine On
# Block […]

By |September 14th, 2015|Papers|

Fun with Powershell: Using TOR with Powershell.

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this article, I will teach you guys on how to connect to TOR network using Powershell.

Powershell is a powerful weapon for Hackers. Those who think that programming is not necessary in Hacking or Security Field just go and watch “POGO”.

 

Powershell Code:

function Get-DnsTXTRecord($DnsHost)
{
$ZipFileUri = (((Invoke-Expression “nslookup -querytype=txt $DnsHost 8.8.8.8”) -match […]

By |September 12th, 2015|Papers|

Google Translator Exploit for hacking Google accounts..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Google is our companion, however regardless it has its defects as everything has a tendency to. A bit known blemish inside the media monster permits phishing to occur on Google accounts that would totally sidestep propelled web assurance programs in client’s programs and also different assurances that have been placed […]

By |September 12th, 2015|Papers|

Searching Exploits directly from Microsoft site.

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this article, I will show you guys how to search Exploits directly from Microsoft site..

 

Step 1: Navigate to Microsoft’s Technet

Too more than 90% of all PCs on the planet run a form Microsoft’s universal Windows working framework (despite the fact that it may shock you that more than 60% […]

By |September 12th, 2015|Papers|

Opening for Cyber Security Specialist – Policy & Standards

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Job description

Cyber Security Specialist – Policy & Standards works with Honeywell Global Security(HGS) & Honeywell businesses to in support of the Security Policy Program. This role involves interfacing with HGS, Enterprise IT and Business leaders and staff to ensure overall Security Policy Program objectives are executed consistent with Program expectations […]

By |September 9th, 2015|job|