Yearly Archives: 2015

/2015

How to Remove Any Evidence from Your Computer

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute Course in Pune

Credits: Jako

Do you have a file (or some of them) that in the wrong hands may cause you troubles? Don’t worry about it, I’ll show you how to wipe it from your computer in order to leave no trace.When you delete a file with the remove […]

By |November 3rd, 2015|Papers|

Hack Like a Pro: Denial-of-Service (DoS) Tools & Techniques

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute Course in Pune

Credits: OTW

Welcome back, my fledgling hackers!

Over the years, we have examined multiple ways to own, exploit, or compromise a system. On the other hand, we have not spent a lot of time on denial-of-service (DoS) attacks.

For those of you who are new here, a denial of […]

By |November 3rd, 2015|Papers|

A simple program in C that will kill antivirus program

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

Hello friends recently in my CEH(Certified Ethical Hacker) class one of mine student told me that he is finding difficulty in bypassing the antivirus on the victim machine.

So I just gave a thought why not to create a program that will kill antivirus 🙂

Logic flowed through the […]

By |November 1st, 2015|Papers|

C++ for Hackers (Basic Mode)

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

 

This is a Basic Mode Notes for C++, more detail notes are in process. Stay tunned..
This tutorial will thoroughly cover…
Structure of a Basic Program
Comments
Variables. Data Types.
Identifiers
Fundamental data types
Declaration of variables
Scope of variables
Initialization of variables
Introduction to strings
Constants
Literals
Integer Numerals
Floating Point Numbers
Character and string literals
Boolean literals
Defined constants (#define)

Structure of a […]

By |November 1st, 2015|Papers|

A Simple Email Grabber coded in Perl

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

 

This is a supportive Tech for Spear Phishing. You can collect random emails using this script, which can be later used for Spear Phishing. Spear Phishing Detail Practical is Covered in the CEH Module, Which include DNS Injection, DNS Redirection, Port Forwarding and VPN building.

Go through the […]

By |November 1st, 2015|Papers|

HOW TO HACK LIKE A PRO – SHODAN, THE WORLD’S MOST DANGEROUS SEARCH ENGINE

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

Sometimes, we don’t have a specific target in mind, but rather we are simply looking for vulnerable and easy-to-hack targets anywhere on the planet. Wouldn’t be great if we had a search engine like Google that could help us find these targets? Well, we do, and it’s […]

By |October 27th, 2015|Papers|

Hacking Windows 10 using a simple windows excel file..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Requirements:

– Veil Evasion
– MacroShop

Step 1(Installation):

First you need to install MacroShop and Veil Evasion. Let’s start with MacroShop. So if you haven’t got MacroShop installed just install it with the command:

PHP Code:

git clone https://github.com/khr0x40sh/MacroShop.git

This can take a while. Meanwhile we can install Veil Evasion. So there are different ways to install Veil Evasion […]

By |October 25th, 2015|Papers|

Phpmyadmin Shell Upload Program in perl

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

While going through are CEH labs, one of our student as that what if he got access to a phpmyadmin portal, is it possible to root the server or upload a shell so that he gets a access of the full web server? And my answer was big yeesss.

 

So here […]

By |October 18th, 2015|Papers|

BACKBOX LINUX 4.4 RELEASED!

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

BackBox is an Ubuntu-based Linux distribution penetration test and security assessment oriented providing a network and informatics systems analysis tool-kit. BackBox desktop environment includes a complete set of tools required for ethical hacking and security testing.

The main aim of BackBox is providing an alternative, highly customizable and well performing system. […]

By |October 18th, 2015|Papers|

OSI Model Tutorial

Extreme Hacking
Advanced Ethical Hacking Institute in Pune
Credits: 9tut

Welcome to the most basic tutorial for networker! Understanding about OSI model is one of the most important tools to help you grasp how networking devices like router, switch, PC… work.

Let’s take an example in our real life to demonstrate the OSI model. Maybe you have ever sent a […]

By |October 15th, 2015|Papers|