Monthly Archives: April 2017

Home » Archives for April 2017 » Page 2

Installing Framework for Man-In-The-Middle attacks in Kali

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Installing MITMf
Note: if you’re rocking Arch Linux: you’re awesome! Just remember to use pip2 instead of pip outside of the virtualenv

Install virtualenvwrapper:

pip install virtualenvwrapper

Edit your .bashrc or .zshrc file to source the virtualenvwrapper.sh script:

source […]

By |April 14th, 2017|Papers|

Intercepting DHCP Requests using DHCPOPTINJ

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

DHCP option injector
Full Credit: Andreas Misje

Have you ever wanted to intercept DHCP requests and squeeze in a few extra DHCP options, unbeknownst to the sender? Probably not. However, should the need ever come, dhcpoptinj will (hopefully) help […]

By |April 13th, 2017|Papers|

MorphAES – World’s first polymorphic shellcode engine

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

MorphAES
IDPS & SandBox & AntiVirus STEALTH KILLER.

MorphAES is the world’s first polymorphic shellcode engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS, it’s cross-platform as well and library-independent.

Properties:

Polymorphism […]

By |April 13th, 2017|Papers|

Umbrella – A Phishing Dropper designed to Pentest.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Umbrella Dropper
Full Credits: Alisson Moretto 
Copyright 2017: Alisson Moretto

Umbrella is a file dropper dedicated to pentest, its download files on target system are execute them without a double execution of exe, only of embed.

To compromise the same target […]

By |April 13th, 2017|Papers|

NetAttack- A Tool for Wireless Network Scan and Attack

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The netattack.py is a python script that allows you to scan your local area for WiFi Networks and perform deauthentification attacks. The effectiveness and power of this script highly depends on your wireless card.
DE-AUTHENTIFICATION ATTACK

python netattack.py […]

By |April 13th, 2017|Papers|

How Your PIN And Password Can Be Stolen Using Your Phone’s Movement

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Your high-end smartphone has tons of new features and sensors. Any new application that you install on your smartphone ask for the camera, microphone, and GPS permission, but what about the other sensors? It’s possible that […]

By |April 11th, 2017|Exploits|

How To Share Your Real-time Live Location With Anybody Using Facebook Messenger

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Real-time location sharing is a very important utility that was missing from Google Maps from a long time. Before bringing this feature to its Maps application, Google launched another app named Trusted Contacts that was a […]

By |April 6th, 2017|Papers|

10 Ways to You Can Use ls Command in Linux Terminal

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

 

ls is a two letter command both Unix users and sysadmins cannot live without. Whether you use it 1 time a day or 1000 times a day, knowing the power of the ls command can make […]

By |April 2nd, 2017|Papers|