Monthly Archives: May 2016

Home » Archives for May 2016 » Page 2

How to Remove Shortcut Virus in 3 Easy Ways

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

What is Shortcut Virus?

Shortcut-virus is a virus which Enters in to your Pen drive, PC, Hard Disk, Memory cards or mobile phone and change your files into shortcuts with the original folder icons.

When you Plugin your Pen drive in Your friend’s Shortcut-Virus affected PC or when […]

By |May 13th, 2016|Papers|

Heartbleed Vulnerability exploitation using Kali

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The Heartbleed vulnerability enables a hacker to trick OpenSSL by sending a single byte of data while telling the server it sent 64K bytes of data. The server will then send back 64K bytes of data to be checked and echoed back. The server will […]

By |May 11th, 2016|Papers|

Application Layer Of OSI Model For Beginners

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

As we talked earlier in the article OSI Model and its 7 layers, the application layer becomes one of the most important layers of the OSI model because it is fundamentally responsible for the communication of the applications running at the applicaiton layer.
Application Layer:
Application is the […]

By |May 8th, 2016|Papers|

New BlackArch Linux version released, now provides 1400 pentesting tools

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

BlackArch Linux version 2016.04.28 released for ethical hackers and security researchers with 1400 pentesting tools

If you are an ethical hacker or a security researcher, this news will undoubtedly interest you. The BlackArch Linux devs have released-the new ISO image of the Arch Linux-based operating system […]

By |May 3rd, 2016|Papers|

Nmap Command Guide — ExtremeHacking

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: nmap.org
Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users.

The […]

By |May 1st, 2016|Papers|

Mass Email Attack using Kali

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Mass email senders is not a new topic for ethical hacking community . Certainly we need to send mass emails during penetration test / phishing tests (to be more specific) . While Phishing tests penetration testers often need to send Bulk emails to […]

By |May 1st, 2016|Papers|

Opening for Sr Security Engineer — Hyderabad

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

POSITION SUMMARY

This role is very important and critical in defining and maintain security framework in and around information systems within the organization. The position requires deep understanding of how things in security industry with extreme granular details of attack patterns, design of thwart […]

By |May 1st, 2016|job|

Opening For Security Analyst – Delhi

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Job Description
Experience: 2 to 4 Yrs

Good understanding in Vulnerability Assessment and Penetration Testing
Familiarity with Security Standards and groups (OWASP, WASC, SANS Top 25 etc.)
Experience in Application Penetration Testing, Vulnerability Assessment and Source code reviews (both Manual as well automated).
Experience in Internal & External […]

By |May 1st, 2016|job|

Opening for Penetration Tester — Chennai, Bangalore

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Job Code                     :   CI/070416/Security/Chennai

Position                       :  Penetration Tester

Experience                  : 1-3 years

Location                      :  Chennai, Bangalore 

Requirements 

1-3 years’ experience in at least three of the following:

Network penetration testing and manipulation of network infrastructure
Mobile and/or web application assessments
Email, phone, or physical social-engineering assessments
Shell scripting or automation of simple […]

By |May 1st, 2016|job|

Opening for Sr. Malware/Security Researcher Engineer – Pune

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Responsibilities

Take research projects from initial concept commit to development and production ready solutions.
Perform cutting edge analysis of Windows and MAC malwares.
Passionate about reverse engineering and should be interested in taking things apart.
Research the threat landscape to enhance FireEye`s core engine.
Experience in researching and […]

By |May 1st, 2016|job|