Yearly Archives: 2015

/2015

Wifi adapter packet injection test

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Questions about if a certain Wifi adapter is compatible with the Aircrack-ng suite or what Wifi card is capable of packet injection and operating monitoring mode are commonly asked at discussion boards and social media. A Wifi adapter that is capable of packet injection and monitoring mode is trivial and important functionality to be successful in […]

By |October 6th, 2015|Papers|

Websploit Wifi Jammer

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be exploring the Websploit Wifi Jammer module which we’ve edited to work with the latest version of Kali Linux. The Websploit Wifi Jammer module is a great tool to automatically disconnect every client connected to the targeted wireless network and access point. The WiFi Jammer […]

By |October 6th, 2015|Papers|

Basic Malware Analysis Tools

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In the upcoming 6 hacking tutorials we will be talking about basic malware analysis and we will start with discussing the many different Basic Malware Analysis Tools which are available. A Malware Analyst is someone highly skilled in reverse engineering malware to get a deep understanding about what a certain piece of malware does and how it […]

By |October 6th, 2015|Papers|

Trojan Threatens Linux Networks

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Credits: Oliver Freeman

The Security Intelligence Response Team issued a high-risk threat advisory for XOR DDoS proliferation.

The XOR DDoS Trojan is used to hijack Linux servers to build a botnet for distributed denial-of-service attacks with SYN and DNS floods.

The massive Linux-based botnet, which they discovered last year, can take down websites under […]

By |October 6th, 2015|Papers|

How to Hack and Decrypt WhatsApp Database (Remotely) [ROOT]

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

WhatsApp?
Almost everyone knows about it. It is a social android application, that’s enables the user to send free messages through the internet within seconds. The developers have made huge success and have high level and complex algorithms to encrypt and store the data, which changes with every update! And hence […]

By |October 6th, 2015|Papers|

Password Cracking Session Intro

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

We are going to start a new session on Password cracking, that will include all sorts of tech needed to break the password. It will be a sort of building block if you are planning to be CEH certified. CEH is one of the most powerful course around, but I […]

By |September 21st, 2015|Metasploit|

Windows 8 Remote Explorer Kill with Shell Code

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This post will elaborate how to take down a Explorer with help of shellcode. In CEH class we had created a dropper with exe extension, this is a more advance dropper that can be used to inject any process for the current example I have taken a explorer process.

The assembly […]

By |September 20th, 2015|Papers|

Inserting Fake Update DNS in Windows 8 through shellcode

 

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

This post will elaborate how to add a fake update DNS with help of shellcode. In CEH class we have already seen how metasploit can be used to make changes in DNS, this is a more advance dropper that can be used to inject any process for the current example […]

By |September 20th, 2015|Papers|

Windows 10 Remote Explorer Kill with Shell Code

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This post will elaborate how to take down a Explorer with help of shellcode. In CEH class we had created a dropper with exe extension, this is a more advance dropper that can be used to inject any process for the current example I have taken a explorer process.

The assembly […]

By |September 15th, 2015|Papers|

Secure your websites from DDOS attack in just one minute..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this article, I will teach you guys on how you could secure your websites from DDOS in just one minute.

 

Simply paste the following code below in your root directory:

<?php
/*
#####################################################
# Script: DDOS Security By Extreme Hacking #
#####################################################
*/

$ Ad_ddos_query = 10, / / ​​number of requests per second to detect DDOS attacks
$ […]

By |September 14th, 2015|Papers|