Monthly Archives: October 2015

Home » Archives for October 2015

HOW TO HACK LIKE A PRO – SHODAN, THE WORLD’S MOST DANGEROUS SEARCH ENGINE

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

Sometimes, we don’t have a specific target in mind, but rather we are simply looking for vulnerable and easy-to-hack targets anywhere on the planet. Wouldn’t be great if we had a search engine like Google that could help us find these targets? Well, we do, and it’s […]

By |October 27th, 2015|Papers|

Hacking Windows 10 using a simple windows excel file..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Requirements:

– Veil Evasion
– MacroShop

Step 1(Installation):

First you need to install MacroShop and Veil Evasion. Let’s start with MacroShop. So if you haven’t got MacroShop installed just install it with the command:

PHP Code:

git clone https://github.com/khr0x40sh/MacroShop.git

This can take a while. Meanwhile we can install Veil Evasion. So there are different ways to install Veil Evasion […]

By |October 25th, 2015|Papers|

Phpmyadmin Shell Upload Program in perl

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

While going through are CEH labs, one of our student as that what if he got access to a phpmyadmin portal, is it possible to root the server or upload a shell so that he gets a access of the full web server? And my answer was big yeesss.

 

So here […]

By |October 18th, 2015|Papers|

BACKBOX LINUX 4.4 RELEASED!

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

BackBox is an Ubuntu-based Linux distribution penetration test and security assessment oriented providing a network and informatics systems analysis tool-kit. BackBox desktop environment includes a complete set of tools required for ethical hacking and security testing.

The main aim of BackBox is providing an alternative, highly customizable and well performing system. […]

By |October 18th, 2015|Papers|

OSI Model Tutorial

Extreme Hacking
Advanced Ethical Hacking Institute in Pune
Credits: 9tut

Welcome to the most basic tutorial for networker! Understanding about OSI model is one of the most important tools to help you grasp how networking devices like router, switch, PC… work.

Let’s take an example in our real life to demonstrate the OSI model. Maybe you have ever sent a […]

By |October 15th, 2015|Papers|

Wifi adapter packet injection test

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Questions about if a certain Wifi adapter is compatible with the Aircrack-ng suite or what Wifi card is capable of packet injection and operating monitoring mode are commonly asked at discussion boards and social media. A Wifi adapter that is capable of packet injection and monitoring mode is trivial and important functionality to be successful in […]

By |October 6th, 2015|Papers|

Websploit Wifi Jammer

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be exploring the Websploit Wifi Jammer module which we’ve edited to work with the latest version of Kali Linux. The Websploit Wifi Jammer module is a great tool to automatically disconnect every client connected to the targeted wireless network and access point. The WiFi Jammer […]

By |October 6th, 2015|Papers|

Basic Malware Analysis Tools

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In the upcoming 6 hacking tutorials we will be talking about basic malware analysis and we will start with discussing the many different Basic Malware Analysis Tools which are available. A Malware Analyst is someone highly skilled in reverse engineering malware to get a deep understanding about what a certain piece of malware does and how it […]

By |October 6th, 2015|Papers|

Trojan Threatens Linux Networks

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Credits: Oliver Freeman

The Security Intelligence Response Team issued a high-risk threat advisory for XOR DDoS proliferation.

The XOR DDoS Trojan is used to hijack Linux servers to build a botnet for distributed denial-of-service attacks with SYN and DNS floods.

The massive Linux-based botnet, which they discovered last year, can take down websites under […]

By |October 6th, 2015|Papers|

How to Hack and Decrypt WhatsApp Database (Remotely) [ROOT]

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

WhatsApp?
Almost everyone knows about it. It is a social android application, that’s enables the user to send free messages through the internet within seconds. The developers have made huge success and have high level and complex algorithms to encrypt and store the data, which changes with every update! And hence […]

By |October 6th, 2015|Papers|