Monthly Archives: November 2015

//November

How to Remove Any Evidence from Your Computer

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute Course in Pune

Credits: Jako

Do you have a file (or some of them) that in the wrong hands may cause you troubles? Don’t worry about it, I’ll show you how to wipe it from your computer in order to leave no trace.When you delete a file with the remove […]

By |November 3rd, 2015|Papers|

Hack Like a Pro: Denial-of-Service (DoS) Tools & Techniques

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute Course in Pune

Credits: OTW

Welcome back, my fledgling hackers!

Over the years, we have examined multiple ways to own, exploit, or compromise a system. On the other hand, we have not spent a lot of time on denial-of-service (DoS) attacks.

For those of you who are new here, a denial of […]

By |November 3rd, 2015|Papers|

A simple program in C that will kill antivirus program

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

Hello friends recently in my CEH(Certified Ethical Hacker) class one of mine student told me that he is finding difficulty in bypassing the antivirus on the victim machine.

So I just gave a thought why not to create a program that will kill antivirus 🙂

Logic flowed through the […]

By |November 1st, 2015|Papers|

C++ for Hackers (Basic Mode)

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

 

This is a Basic Mode Notes for C++, more detail notes are in process. Stay tunned..
This tutorial will thoroughly cover…
Structure of a Basic Program
Comments
Variables. Data Types.
Identifiers
Fundamental data types
Declaration of variables
Scope of variables
Initialization of variables
Introduction to strings
Constants
Literals
Integer Numerals
Floating Point Numbers
Character and string literals
Boolean literals
Defined constants (#define)

Structure of a […]

By |November 1st, 2015|Papers|

A Simple Email Grabber coded in Perl

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

 

This is a supportive Tech for Spear Phishing. You can collect random emails using this script, which can be later used for Spear Phishing. Spear Phishing Detail Practical is Covered in the CEH Module, Which include DNS Injection, DNS Redirection, Port Forwarding and VPN building.

Go through the […]

By |November 1st, 2015|Papers|