Sadik Shaikh

/Sadik Shaikh

About Sadik Shaikh

Mr. Sadik Shaikh is a Technology Evangelist and associated with numerous government and private organizations in Information Security and Cyber Forensics since past sixteen years. He carries a robust technical experience in VAPT for Network, Cloud, Scada, Mobile and Web Applications. He has conducted more than 300+ successful pentest projects. He is acknowledged and listed in "Hackers Hall Of Fame" for finding several security flaws in Department of Defense (DoD), European Cert, Netherland Cert, United Nations, NCIIPC, Microsoft, Apple, Adobe, Yahoo, Twitter, AOL, Amazon, Accenture, Intel, Dell, Lenovo, Mozilla, Opera, Oracle, Mastercard, Western Union, SAP, Sony, Sophos, Rapid7, Alien Vault, eBay, OLX, ISC2, SANS, Blackberry, Vodafone, HTC, AT&T, Nokia, Netgear, Huawei and several of the other 50 plus top Fortune companies. He is an expert and consultant for the Police Department and Defence in solving Cyber Terrorism Cases. He is on CEH Review Board, ECSA/LPT Review Board, CND Review Board, and CAST Review Board. He is MPhil, MCA, MBA(IT), PG Diploma in Cyber Security, PG Diploma in Forensic Science and is pursuing a Ph.D. in Cyber Security. He is certified for CCNA, CCNA Security, MCP, MCSA, MCSE, SCJP, CCI, CEI, CND, CTIA, CEH, ECSA, CHFI, CAST 611, CAST 612, CISM, ISO 27001:2013, Certified Block Chain Expert. He is awarded with BugCrowd MVP and has trained top corporate personnel of Symantec, Quick Heal, BMC Software, Wipro, Cognizant, Syntel, Infosys, Intel, Dell, Fujitsu, Atos, HCL, Accenture, Zensar, Cybage, Samsung, TCS, L&T, John Deere and other 50 plus top Fortune companies. He actively works with DRDO, National Defence Academy - Pune, Pune Police, CID & ATS - Maharashtra. Connect him @ https://www.linkedin.com/in/sadikshaikh

Opening for CEH fresher

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

No Of Openings – 2

Experience – 0 – 5 yrs

Job Description
– Intermediate knowledge of security, encryption, phishing and CVE
– Intermediate knowledge of Pen Testing Tools for Cyber Security
– Good English and communication skills
– Ability to operate within a team and follow instructions
– Time Management
– Search for […]

By |January 21st, 2016|job|

Here’s how a cheap webcam can be converted into network backdoor

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

This is how a $30 D-Link webcam can be converted into a backdoor
Researchers at US security firm Vectra Networks have hacked a ‘tiny’ D-Link web camera and demonstrated how it can be abused by cybercriminals and turned into a medium to steal data or for sending additional […]

By |January 18th, 2016|Papers|

How To Find IMEI Number Of Your Phone (Even If It’s Lost)

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The IMEI number, also known as MEID number, acts your phone’s unique identifier. As no two devices have the same IMEI or MEID number, it becomes the best tool to track lost phones.

This unique number is assigned to every new phone and it’s actually associated with the […]

By |January 17th, 2016|Papers|

Top Ten Simple and Useful Internet Tricks That You May Not Know

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Internet Hack : Top 10 Simple and useful Internet tricks for you
There are some simple keyboard shortcuts which one can use while using Internet and it would help the user to avoid typing a lot and also at certain places the mouse can be completely avoided […]

By |January 14th, 2016|Papers|

Android.Bankosy Trojan Learns To Steal Your One-Time Passwords Sent Through Calls

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The year 2015 saw an unparalleled increase in the notorious financial trojans. These banking trojans get evolved with time and target the security improvements made by the financial institutions. One-time passwords — one such security measure for banking applications — are being intercepted by an Android […]

By |January 13th, 2016|Papers|

Microsoft Wants To Teach You How To Use Linux With Its New Certification Program

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

When we first said that Microsoft loves Linux, we were not joking. Microsoft has embraced Linux many times over in the recent times and proved us right. It was absolutely unthinkable few years ago, thanks to former CEO Steve Ballmer who went on to call Linux […]

By |January 13th, 2016|Papers|

Find out how Facebook knows everything about you

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Do you know Facebook knows everything about you and your preferences? Find out how
If you are a Facebook user, then you should know that by using Facebook, you have given consent to the company to track your activity for advertisers, who in turn hope to show […]

By |January 13th, 2016|Papers|

Top 5 tips to get some privacy and go invisible on WhatsApp

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Here are some tips to go invisible on WhatsApp and get some privacy
It was easy to go invisible whenever one wanted while using Google Talk aka GTalk. To get some privacy, all you had to do was toggle the invisible mode in the Google Talk.

However, it […]

By |January 13th, 2016|Papers|

Einstein’s Mass Energy Equation Is Insufficient, Claims Indian Researcher

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

In an international paper, Ajay Sharma, an Indian researcher has claimed that Albert Einstein’s mass-energy equation – E=mc2 – hasn’t been completely studied under all circumstances and it is inadequate. In his research paper, Mr. Sharma says that the equation has been studied only under special conditions of […]

By |January 11th, 2016|Papers|

Learn to Code: Best Places to Learn C and C++ Programming Languages

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

In his famous lost interview, Steve Jobs said, “I think everybody in this country should learn how to program a computer because it teaches you how to think”. This line makes perfect sense to me.

If you are studying some introductory course of Computer Science or planning to […]

By |January 10th, 2016|Papers|