Yearly Archives: 2017

/2017

Umbrella – A Phishing Dropper designed to Pentest.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Umbrella Dropper
Full Credits: Alisson Moretto 
Copyright 2017: Alisson Moretto

Umbrella is a file dropper dedicated to pentest, its download files on target system are execute them without a double execution of exe, only of embed.

To compromise the same target […]

By |April 13th, 2017|Papers|

NetAttack- A Tool for Wireless Network Scan and Attack

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The netattack.py is a python script that allows you to scan your local area for WiFi Networks and perform deauthentification attacks. The effectiveness and power of this script highly depends on your wireless card.
DE-AUTHENTIFICATION ATTACK

python netattack.py […]

By |April 13th, 2017|Papers|

How Your PIN And Password Can Be Stolen Using Your Phone’s Movement

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Your high-end smartphone has tons of new features and sensors. Any new application that you install on your smartphone ask for the camera, microphone, and GPS permission, but what about the other sensors? It’s possible that […]

By |April 11th, 2017|Exploits|

How To Share Your Real-time Live Location With Anybody Using Facebook Messenger

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Real-time location sharing is a very important utility that was missing from Google Maps from a long time. Before bringing this feature to its Maps application, Google launched another app named Trusted Contacts that was a […]

By |April 6th, 2017|Papers|

10 Ways to You Can Use ls Command in Linux Terminal

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

 

ls is a two letter command both Unix users and sysadmins cannot live without. Whether you use it 1 time a day or 1000 times a day, knowing the power of the ls command can make […]

By |April 2nd, 2017|Papers|

US ISPs do not care about User Privacy and collects Personal Data

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

US legislation is about to pass a law that will allow the Internet service providers to share user’s personal information to advertising agencies.

As per reports, House of Representatives voted for a bill which will allow the […]

By |March 31st, 2017|Exploits|

WIBR+ – WiFi Hacking Tool For Android

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Today we are going to talk about an Android app that is used for hacking. WIBR+ is a free android app which is capable of cracking the WiFi passwords. It is basically designed to test the security […]

By |February 20th, 2017|Papers|

TinfoLeak – Full Information About A Twitter User Activity

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Tinfoleak is the best OSINT tool for Twitter, and is open-source. The latest updated version includes a lot of new and improved features.
Features

Search by coordinates.
Geolocated users.
Tagged users.
User conversations.
Identification in other social […]

By |January 18th, 2017|Papers|

How To perform Mass Mailer Attack using Setoolkit On Kali Linux

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
What is mass mailer attack?
Mass mailer allow you to send emails to multiple individual in a list.The format is simple,it will email based of line.so it should look like the following:

massmailerattack@gmail.com
mass-mailing@gmail.com
mass-email@gmail.com
free-email-marketing@gmail.com
mass-email-sender@gmail.com
mass-email-service@gmail.com
email-blast@gmail.com
bulk-email-sender@gmail.com

This will continue through until it […]

By |January 10th, 2017|Papers|

Hakku Framework – Simple Penetration Testing Framework

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Hakku Framework is been made for penetration testing. It offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is written in python 3.5, and developed mainly on Arch Linux.
System Requirements

Python 3.5 and […]

By |January 10th, 2017|Papers|