Yearly Archives: 2015

/2015

Secure your website just in one minute..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

In this article, I will teach you guys on how you could secure your websites in just one minute.

 

Simply create a file named as .htaccess and paste the following code below:

#####################################################
# Script: htaccess Security By Extreme Hacking #
#####################################################
# No web server version and indexes
ServerSignature Off
Options -Indexes
# Enable rewrite engine
RewriteEngine On
# Block […]

By |September 14th, 2015|Papers|

Fun with Powershell: Using TOR with Powershell.

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this article, I will teach you guys on how to connect to TOR network using Powershell.

Powershell is a powerful weapon for Hackers. Those who think that programming is not necessary in Hacking or Security Field just go and watch “POGO”.

 

Powershell Code:

function Get-DnsTXTRecord($DnsHost)
{
$ZipFileUri = (((Invoke-Expression “nslookup -querytype=txt $DnsHost 8.8.8.8”) -match […]

By |September 12th, 2015|Papers|

Google Translator Exploit for hacking Google accounts..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Google is our companion, however regardless it has its defects as everything has a tendency to. A bit known blemish inside the media monster permits phishing to occur on Google accounts that would totally sidestep propelled web assurance programs in client’s programs and also different assurances that have been placed […]

By |September 12th, 2015|Papers|

Searching Exploits directly from Microsoft site.

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this article, I will show you guys how to search Exploits directly from Microsoft site..

 

Step 1: Navigate to Microsoft’s Technet

Too more than 90% of all PCs on the planet run a form Microsoft’s universal Windows working framework (despite the fact that it may shock you that more than 60% […]

By |September 12th, 2015|Papers|

Opening for Cyber Security Specialist – Policy & Standards

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Job description

Cyber Security Specialist – Policy & Standards works with Honeywell Global Security(HGS) & Honeywell businesses to in support of the Security Policy Program. This role involves interfacing with HGS, Enterprise IT and Business leaders and staff to ensure overall Security Policy Program objectives are executed consistent with Program expectations […]

By |September 9th, 2015|job|

Opening for Application Security Professionals

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Job description

We are currently looking for professionals with 3.5-6 Years of experience and who can fulfill the following criteria:

 Hands-on experience in Application Code Review & tool exposure CheckMarx, Fortify, IBM AppScan Source, Veracode
 Exposure to  Application Vulnerability Assessment/ Penetration Testing Cenzic, IBM AppScan
 Knowledge estimation technique, Good Application Security Concept (OWSAP,CWSS)
Understanding of network and […]

By |September 9th, 2015|job|

Common Types of Password Cracking Methods..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Social Engineering:

Social engineering is when a hacker takes advantage of trusting human beings to get information from them. For example, if the hacker was trying to get the password for a co-workers computer, he could call the co-worker pretending to be from the IT department. Social Engineering is used for […]

By |September 9th, 2015|Papers|

opening for Web Application Security Analyst

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Job description

As a Web Applications Security Analyst you will be acting as a subject matter expert to implement various automated and manual techniques and detailed penetration testing procedures that will cover all aspects web security. You will engage with regional customers and partners to perform analysis of customer requirements and […]

By |September 7th, 2015|job|

How to use Google Translate as a proxy

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Not sure if many people know about this but you can use Google Translate as a proxy:

To show it works:

www.extremehacking.org
CEHv8 CHFIv8 ECSAv8 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE,Certified Ethical Hacking, Center For Advanced Security Training in […]

By |September 7th, 2015|Papers|

Flash player SE spread method..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

I have made a simple method to spread your server with Flash player social engineering.
The victim will see a notification that they have outdated Flash Player and to stay secure they have to update their Flash Player.

What actually will happen:
They download your binded server with a real Flash Player update.
And […]

By |September 7th, 2015|Papers|