Sadik Shaikh

/Sadik Shaikh

About Sadik Shaikh

Mr. Sadik Shaikh is a Technology Evangelist and associated with numerous government and private organizations in Information Security and Cyber Forensics since past sixteen years. He carries a robust technical experience in VAPT for Network, Cloud, Scada, Mobile and Web Applications. He has conducted more than 300+ successful pentest projects. He is acknowledged and listed in "Hackers Hall Of Fame" for finding several security flaws in Department of Defense (DoD), European Cert, Netherland Cert, United Nations, NCIIPC, Microsoft, Apple, Adobe, Yahoo, Twitter, AOL, Amazon, Accenture, Intel, Dell, Lenovo, Mozilla, Opera, Oracle, Mastercard, Western Union, SAP, Sony, Sophos, Rapid7, Alien Vault, eBay, OLX, ISC2, SANS, Blackberry, Vodafone, HTC, AT&T, Nokia, Netgear, Huawei and several of the other 50 plus top Fortune companies. He is an expert and consultant for the Police Department and Defence in solving Cyber Terrorism Cases. He is on CEH Review Board, ECSA/LPT Review Board, CND Review Board, and CAST Review Board. He is MPhil, MCA, MBA(IT), PG Diploma in Cyber Security, PG Diploma in Forensic Science and is pursuing a Ph.D. in Cyber Security. He is certified for CCNA, CCNA Security, MCP, MCSA, MCSE, SCJP, CCI, CEI, CND, CTIA, CEH, ECSA, CHFI, CAST 611, CAST 612, CISM, ISO 27001:2013, Certified Block Chain Expert. He is awarded with BugCrowd MVP and has trained top corporate personnel of Symantec, Quick Heal, BMC Software, Wipro, Cognizant, Syntel, Infosys, Intel, Dell, Fujitsu, Atos, HCL, Accenture, Zensar, Cybage, Samsung, TCS, L&T, John Deere and other 50 plus top Fortune companies. He actively works with DRDO, National Defence Academy - Pune, Pune Police, CID & ATS - Maharashtra. Connect him @ https://www.linkedin.com/in/sadikshaikh

How does Facebook know who your friends are?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Facebook knows who your friends are, even better than you do?
The social media giant uses a mix of complex science and mathematics to narrow down on your friends list
Have you ever thought how Facebook exactly predicts your friends, sometimes even those whom you have long forgotten.

Last week, […]

By |December 30th, 2015|Papers|

Hackers using startling new ways to steal your passwords

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

You are dining outside in a restaurant and you receive an email. You remove your phone and without even thinking twice, you key in the PIN required to unlock your phone. Nobody can see what password you have typed, as your back is facing the wall. […]

By |December 30th, 2015|Papers|

Noble Cause: Blood Donation Camp @Pimple Gurav Pune

Blood Donation Camp arranged by Parivartan and Ayuda Foundation.

Blood Donation is service to Humankind, By Donating Blood you help a needy and save a precious life.
Transfusion of blood saves Millions of life all over the world every year, There are Millions of Blood Donors all over the world But still their are number of countries […]

By |December 30th, 2015|Hackers Charity|

Best Free Android Antivirus For Your Smartphone, According To AVTest

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

AVTest put 25 security apps on test for six months for their security capabilities. However, these apps were not only rated based on their protection capabilities, but also on their usability, extra features, battery drain, bandwidth usage etc.

Out of the 25 apps, four apps get a […]

By |December 30th, 2015|Papers|

World’s Fastest Password Cracking Tool Hashcat Is Now Open Source

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

 

If you are into password cracking, you might be aware of the fact that Hashcat is one of the most popular CPU-password recovery tools that is available for free. Hashcat is known for its speed and versatile nature to crack multiple types of hashes.

Now, going one […]

By |December 30th, 2015|Papers|

Microsoft is storing your encryption keys in the clouds, here is how to delete it

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

If you have bought a new Windows based PC or laptop you will have used the all new disk encryption which is built-in and turned on by default,  This key is meant to protect your data in case your device is lost or stolen. However, one of unknown […]

By |December 29th, 2015|Papers|

This is how you can build your own Raspberry Pi powered magic smart mirror

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Remember our report in October 2015, in which a web developer, Evan Cohen built a Raspberry Pi powered magic smart mirror. Well, another developer, Dylan Pierce has not only built a similar magic smart mirror, he has come out with a complete do it yourself tutorial so that […]

By |December 29th, 2015|Papers|

Ruby 2.3.0 Released With New Features And Performance Improvements

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Designed and developed by Yukihiro “Matz” Matsumoto of Japan, Ruby is a dynamic, object-oriented, and general-purpose programming language. With the introduction of Rails web framework, Ruby has attracted programmers from all over the world who have worked hard to “make Ruby natural, not simple”.

Just a few […]

By |December 29th, 2015|Papers|

Interesting Facts About Computer And Internet You May Not Know

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Here is a list of interesting facts about Computer and Internet that might make you surprise. In this list the image belongs to respect to author and we don’t own any one of them.

The first actual computer “bug” was a dead moth which was stuck in a […]

By |December 28th, 2015|Papers|

Banks Mum Over Credit Card Flaw: Because Fraud Is a Profitable Business?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

So who is at bigger risk? Consumers or the banks? Eventually, who is going to earn more money from the plastic, banks or the customers? In the core of the whole talk, the question finally boils down to the fact that “Is fraud a profitable business […]

By |December 28th, 2015|Papers|