Monthly Archives: March 2016

Home » Archives for March 2016

Top 10 Android ROMs for customizing your Android device

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Tired of Stock Android firmware then check these 10 Best Custom Android ROMs and try out one of them

What is the meaning of Custom Android ROM : It includes anything from  making changes to the custom codes in such a way so that the Android device starts […]

By |March 19th, 2016|Papers|

DROWN VULNERABILITY IS STILL AT HIGH RISK – RESEARCH SAYS

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Patching the systems at risk due to massive transport layer security (TLS) vulnerability  which is known as DROWN is still having hard time providing complete protection. Two research firms , Netskope and Skyhigh Networks, says that a week after the vulnerability was identified DROWN still presents a high risk […]

By |March 14th, 2016|Papers|

opening for Security Consultant

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Job Responsibility
Consultant will be responsible technical security assessment including source code review, vulnerability assessment and penetration testing of application, network, and mobile application as well as security research is required for all organization.

The consultant ensure that networks, applications and products are secure from the all type […]

By |March 11th, 2016|job|

Create simple Config – Sentry MBA

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

First open up Sentry MBA(if you have AIO version, do a full reset first)

Take the login url and paste it under Sitie: in sentry mba like this:

Then move over to “HTTP Headers” under General:

Set the Request Method to “MW”(Magic Wand):

Now press the orangeish Magic Wand:

Press “Analyze […]

By |March 9th, 2016|Papers|

Android smartphone and iPhone can be hacked using side channel attack

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Researchers use Side-Channel attack to steals Encryption keys from Android and iOS Devices
Side-channel attack has been used earlier to hack into air gapped computers but this is the first time researchers have used this vector to steal encryption keys from Android smartphones and iOS devices. Five researchers […]

By |March 5th, 2016|Papers|

Top 10 Coolest Notepad Tricks and Hacks for Your PC

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Top 10 Coolest Notepad Tricks and Hacks for Your PC
1. Make Notepad your Personal Diary
Do you want a diary in your computer? Notepad can be turned into a personal logbook by simple steps. Everything you type will be saved with the particular date and time.

Follow these […]

By |March 4th, 2016|Papers|