Monthly Archives: August 2016

//August

CSRF Exploitation Guide

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

CSRF is likely one of the most prominent vulnerabilities today.
When it is mixed with XSS, it can be seriously deadly.

Cross Site Request Forgery can be used to trick an administrator/person into browsing a webpage which contains a function.

A CSRF attack takes the privileges of a […]

By |August 29th, 2016|Papers|

Create your own FUD Backdoors with Empire

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

This tutorial is not for those who have no idea how to Linux, or those who are not efficient with common Linux commands. You have been warned. I will not be showing you how to install Empire. It is up to you to install Empire […]

By |August 25th, 2016|Papers|

Tor or VPN? What’s Best And Which One Should I Use?

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The two anonymity tools, Tor and VPN, are often confused to be rivals, as assumed by a layman internet user. But the question about the rivalry between the two is as vague as it is to compare a burger and french fries, as both them […]

By |August 17th, 2016|Papers|

Best CMD commands used in hacking

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Top CMD or MS-DOS prompt commands which every hacker should know
If you have been following Techworm regularly, chances are you are a very versatile hacker in your own right and don’t need to know these commands. But many of our readers who are beginners and […]

By |August 16th, 2016|Papers|

Congestion Control In Frame Relay — Basic Working Mechanisms

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

 

Frame Relay manages the congestion control very wisely on the network. .

First, to reduce the congestion control, Frame relay only uses a single bit in its header. Furthermore, it uses notification system for congestion not exclusively for the per virtual circuit connection flow control — […]

By |August 16th, 2016|Papers|

NSA HACKED!!! Multiple Hacking Tools And Exploits Leaked Online

 The Shadow Brokers  | Ethical Hacking Training Institute 
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

It seems that the NSA has been hacked. This is being speculated after a group of hackers going by the name “The Shadow Brokers” has claimed to breach an NSA-controlled hacking organization.

The hacking group has  leaked some private hacking tools and […]

By |August 16th, 2016|NSA Hacked|

Torrentz is back online in a new avatar

torrentz | torrentz.eu is back | torrentz.eu | torrentz2.eu

The largest torrent meta-search engine in the world Torrentz.eu after biddding farewell to millions of its users on August 5 is now back in a new avatar.

It made a comeback in the form of torrentz2.eu.

The new domain says that “Torrentz2.eu is a clone of Torrentz, a free, fast and powerful […]

By |August 9th, 2016|torrentz, torrentz.eu is back|

Metasploit basic command guide.

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

msf > use auxiliary/server/socks4
msf > run

**msfvenom**
The msfvenom tool can be used to generate Metasploit payloads (such as Meterpreter) as standalone files and optionally encode
them. This tool replaces the former msfpayload and msfencode tools. Run with ‘’-l payloads’ to get a list of payloads.

$ msfvenom –p […]

By |August 9th, 2016|Metasploit|

Pokemon Go banned by Iranian authorities over ‘security’

Pokemon Go Banned | Pokemon Go Hacks And Tricks
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Authorities in Iran have banned the Pokemon Go app because of unspecified “security concerns”.

The decision was taken by the High Council of Virtual Spaces, the official body overseeing online activity.

Iran follows a number of other countries in expressing its worries over security […]

By |August 7th, 2016|Pokemon Go Hacks and Tricks|

How to setup an IP logger that can bypass a VPN

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Today I’m releasing my tutorial on how to setup a WebRTC IP logger. It is capable of bypassing VPNs and few proxies.

Before we get started, here’s what you’re going to need!

Basic Requirements
+ Basic Webhosting Service (and a domain/subdomain obviously)
+ A brain
+ A basic understanding of technology.

Let’s […]

By |August 4th, 2016|Pokemon Go Hacks and Tricks, Tracking Proxy IP|