Daily Archives: September 12, 2015

Fun with Powershell: Using TOR with Powershell.

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this article, I will teach you guys on how to connect to TOR network using Powershell.

Powershell is a powerful weapon for Hackers. Those who think that programming is not necessary in Hacking or Security Field just go and watch “POGO”.

 

Powershell Code:

function Get-DnsTXTRecord($DnsHost)
{
$ZipFileUri = (((Invoke-Expression “nslookup -querytype=txt $DnsHost 8.8.8.8”) -match […]

By |September 12th, 2015|Papers|

Google Translator Exploit for hacking Google accounts..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Google is our companion, however regardless it has its defects as everything has a tendency to. A bit known blemish inside the media monster permits phishing to occur on Google accounts that would totally sidestep propelled web assurance programs in client’s programs and also different assurances that have been placed […]

By |September 12th, 2015|Papers|

Searching Exploits directly from Microsoft site.

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this article, I will show you guys how to search Exploits directly from Microsoft site..

 

Step 1: Navigate to Microsoft’s Technet

Too more than 90% of all PCs on the planet run a form Microsoft’s universal Windows working framework (despite the fact that it may shock you that more than 60% […]

By |September 12th, 2015|Papers|