Monthly Archives: February 2016

//February

Best Alternatives to Tor Browser to Browse Anonymously

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

There are possibilities of Tor being compromised by the NSA who has called it “the king of high secure and low latency anonymity.” The US department of defense, that includes NSA, funds the Tor Project and in the past, it has tried to compromise its integrity. The […]

By |February 21st, 2016|Papers|

Extreme Hacking: Nmap Cheat Sheet

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

 

BASIC SCANNING TECHNIQUES

Goal
Command
Example

Scan a Single Target
nmap
nmap 192.168.0.1

Scan Multiple Targets
nmap
nmap 192.168.0.1 192.168.0.2

Scan a List of Targets
nmap -iL
nmap -iL targets.txt

Scan a Range of Hosts
nmap
nmap 192.168.0.1-10

Scan an Entire Subnet
nmap [ip address/cdir]
nmap 192.168.0.1/24

Scan Random Hosts
nmap -iR
nmap -iR 0

Excluding Targets from […]

By |February 8th, 2016|Papers|

Opening for Web Application Pen-Tester / Web Application Security Analyst

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Position: Web Application Pen-Tester / Web Application Security Analyst

Location : Ahmadabad and Mumbai

Primary Skills:

Understanding of TCP/IP, sockets and network tools
Understanding of HTTP protocol
Building web based applications
Programming in C#, ASP.NET
Programming with Javascript
SQL queries
Use a protocol analyser/sniffer
Write scripts in Python or Ruby

Soft skills:

Clarity of communication
Self organization
Self learning
Visual documentation – […]

By |February 8th, 2016|job|

Troubleshoot Your PC Using Windows Reliability Monitor

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Troubleshooting Windows 10 can be a pain, especially when your CPU is getting heated up or your computer is performing too slow. Sometimes, we also install unwanted applications which are not needful and moreover, they also consume a lot of CPU uses in Windows 10.

Reliability Monitor […]

By |February 7th, 2016|Papers|

Welcome To The Malware Museum: An Epic Online Collection Of Old-school Viruses

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Over the past years, security threats have managed to haunt our computers in multiple ways. To remind you about those old-school MS-DOS viruses, we are going to tell you the address of the Malware Museum.

Created by security expert Mikko Hypponen, the Malware Museum is an Archive.org […]

By |February 7th, 2016|Papers|

How to Install Linux On Your Android Phone Without Rooting

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Canonical is betting big on its official Ubuntu smartphones and working hard to hit the Convergence right spot. However, if you don’t want to go to the market to buy a phone running a Linux distro and you want to use a version other than Ubuntu Phone, […]

By |February 7th, 2016|Papers|

Opening for Manager – Security Operations Center

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Experience:

8 to 12 years of total experience in Security Domain
Atleast 6 to 8 years of experience in Managing SOC operations.

Job Description:
Head the SOC providing Managed Security Services to customers

Assist the team and manage customers’ security products including Check Point Firewalls, CiscoASAs, Blue Coat Proxy Servers, LogRhythm […]

By |February 1st, 2016|job|

Job Openings for Application Security / Penetration Testing / Security Consultants

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Experience Required :

Minimum 1 year experience in Application Security

Job Description :

Security Brigade is looking for talented Application Security Consultants who will be responsible for security assessments and penetration testing
of application and enterprise environments as well as security research and development of security tools, processes and testing […]

By |February 1st, 2016|job|

10 Best Operating Systems For Ethical Hacking And Penetration Testing

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

It’s time to pause the archaic Windows vs. OS X vs. Linux discussion and switch over to some advanced operating systems dedicated to pen testing and ethical hacking. A security-focused operating system is a hacker’s best friend as it helps them to detect the weaknesses in […]

By |February 1st, 2016|Papers|