Monthly Archives: May 2016

Home » Archives for May 2016

Seven Ways in Which You Can Bypass Android’s Secured Lock Screen

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

You Can Bypass Android’s Secured Lock Screen In These 7 Ways
To prevent unwanted access to your phone such as keeping strangers (or friends) from checking out your messages or private pictures, it always sensible to enable certain security measures. The most commonly used […]

By |May 29th, 2016|Papers|

After ProxyHam’s Disappearance, Here’s How to Make Your Own ProxyHam for Anonymous Browsing

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

ProxyHam used a 900MHz radio link to bridge a WiFi network over 2.5 miles by severing the link between IP addresses and physical locations. For the time being, ProxyHam has vanished, but the relentless lovers of anonymity and security tool developers, say that […]

By |May 27th, 2016|Papers|

Sniffing encrypted SSL/TLS traffic – ExtremeHacking Guide

 

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The traditional network traffic (non-encrypted) can be easily captured these days by running a tool such as ettercap, which can also be found in Kali Linux. What we are going to deal with now is not about this but about the encrypted network traffic.
The SSL/TLS […]

By |May 26th, 2016|Papers|

Mobile Device App Inventory Auditing with Nessus

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In the world of mobile apps, if you are looking for malware, there are apps (yes, plural) for that. How about one that leaks sensitive content? There are apps for that, too. Pick any other mobile attack vector; chances are there is an […]

By |May 22nd, 2016|Papers|

Pentesting firewall with Hping3

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

1. Testing ICMP: In this example hping3 will behave like a normal ping utility, sending ICMP-echo und receiving ICMP-reply
hping3 -1 0daysecurity.com
2. Traceroute using ICMP: This example is similar to famous utilities like tracert (windows) or traceroute (linux) who uses ICMP packets increasing every […]

By |May 22nd, 2016|Papers|

Hacking Web App using Burp Suite — A Short Guide

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: PrimalSec

Web Application Testing Overview:

Web application vulnerabilities offer a large amount of risk to enterprise systems.  Many web application vulnerabilities are a result of lack of input sanitization to the web application.  In short, web applications leverage some form of input from the […]

By |May 22nd, 2016|Papers|

This 25 year old hacker makes $100,000 a year moonlighting as ‘bug bounty’ hunter

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

25 year-old cofounder of HackerOne makes $100,000 a year from finding bugs
Bugs are a major pain to the tech industry because a single unpatch bug can mean a worrisome data leak of millions of users of that particular product. Hunting for bugs by […]

By |May 17th, 2016|Papers|

Session Layer Of OSI Model: Basics Of Protocols, Authentication And Authorization

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

As we talked earlier in the article OSI Model and its 7 layers, the session layer is an important layer as it is responsible for maintaining, authorizing and authenticating a session between two end-user applications.

Have you ever wondered how your PC maintains a connection […]

By |May 15th, 2016|Papers|

How To Use Netstat Commands To Monitor Network On Windows Using CMD

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

We often seek the help of a program or a tool in doing small things in our Windows like cleaning a drive, managing the firewall etc. However, these things, up to a level, are also possible if you are aware of the basic […]

By |May 15th, 2016|Papers|

Introduction and Architecture of Android

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Today I will tell you what Android is. Many of my candidates asked me what actually Android consist of?

So here we go, Android is a Mobile Platform which consists of 3 things:

Operating System
Middle Ware
Key Applications.

Any electronic device consist of 2 things:

Hardware
Software

The Software Components can […]

By |May 13th, 2016|Papers|