Yearly Archives: 2015

/2015

Opening for CEH Fresher Candidate – Pune

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Opening  for CEH Fresher Candidate – Pune.

Please find below the details for the profile:-

Experience level- 0-0.6 month

Training period: 6 months Stipend (for initial 6 months): 10,000 month CTC Revised after 6 months: 1.8-2.2 lpa

Please let us know if you have any query.

Contact : mail […]

By |December 17th, 2015|job|

Opening for Secure Web developer – Fresher

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Job description:
Develop and support/maintain web applications using Node.JS, Java, and similar for multi-tier application
Interfacing with MongoDB and MySQL
Perform security testing of web application using OWASP ZAP and other web proxies, WebInspect AppScan, NMAP, Nessus, and similar tools
Perform VA-PT for network security assurance

Interested candidate kindly drop your CV to […]

By |December 17th, 2015|job|

The most important skills to become a hacker

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Credit: Lucio Cardoso

Being a Hacker is not only about coding, computer hardware/software and networking. Of course, these are really important, but there are other skills that you should consider even before you think about study programming, exploit, pen test, etc. So, in this post, i’ll tell […]

By |December 15th, 2015|Papers|

OFFICE 2013 EXPLOIT CREATION – ExtremeHacking

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Description / About

Creating a document that will download your executable application and executing it isn’t as difficult as you think it is. If you follow this tutorial and use the resources given to you, I have the highest hope that by the end you’ll have a […]

By |December 13th, 2015|Papers|

How To Access Unsecured Security Cameras Around The World

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Watch Security Cameras:

All that we are looking at is a bunch of unsecured cams from around the world that are interfaced with the internet. So how do you find such cameras? Just google any of these following strings and select any result.

Whoa, you can see a live cam on […]

By |December 13th, 2015|Papers|

Hacker-Friendly Search Engine that Lists Every Internet-Connected Device

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Meet an all-new Hacker’s Search Engine similar to Shodan – Censys.

At the end of last month, security researchers from SEC Consult found that the lazy manufacturers of home routers and Internet of Things (IoT) devices have been re-using the same set of hard-coded cryptographic keys, leaving […]

By |December 11th, 2015|Papers|

Hacking Gmail account using GX cookie

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

Introduction

Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attempt. The method which I will describe in this post is not new; the same method can be applied to yahoo and other free web email […]

By |December 10th, 2015|Papers|

Using XSS for bypassing CSRF protection

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

Well, now we go to the important part, how to use XSS to bypass CSRF protection. This technique applies to those websites, who have an application guarded by CSRF, and another page which is vulnerable to XSS. Using that XSS we can bypass the CSRF protection […]

By |December 10th, 2015|Papers|

These Top 10 Programming Languages Have Most Vulnerable Apps on the Internet

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

A new research showed that Scripting languages, in general, give birth to more security vulnerabilities in web applications, which raised concerns over potential security bugs in millions of websites.

The app security firm Veracode has released its State of Software Security: Focus on Application Development report (PDF), […]

By |December 5th, 2015|Papers|

A Step-by-Step Guide — How to Install Free SSL Certificate On Your Website

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

Another Big Milestone – Let’s Encrypt is now offering Free HTTPS certificates to everyone.

Let’s Encrypt has opened to the public, allowing anyone to obtain Free SSL/TLS (Secure Socket Layer/Transport Layer Security) certificates for their web servers and to set up HTTPS websites in a few simple […]

By |December 4th, 2015|Papers|