Sadik Shaikh

/Sadik Shaikh

About Sadik Shaikh

Mr. Sadik Shaikh is a Technology Evangelist and associated with numerous government and private organizations in Information Security and Cyber Forensics since past sixteen years. He carries a robust technical experience in VAPT for Network, Cloud, Scada, Mobile and Web Applications. He has conducted more than 300+ successful pentest projects. He is acknowledged and listed in "Hackers Hall Of Fame" for finding several security flaws in Department of Defense (DoD), European Cert, Netherland Cert, United Nations, NCIIPC, Microsoft, Apple, Adobe, Yahoo, Twitter, AOL, Amazon, Accenture, Intel, Dell, Lenovo, Mozilla, Opera, Oracle, Mastercard, Western Union, SAP, Sony, Sophos, Rapid7, Alien Vault, eBay, OLX, ISC2, SANS, Blackberry, Vodafone, HTC, AT&T, Nokia, Netgear, Huawei and several of the other 50 plus top Fortune companies. He is an expert and consultant for the Police Department and Defence in solving Cyber Terrorism Cases. He is on CEH Review Board, ECSA/LPT Review Board, CND Review Board, and CAST Review Board. He is MPhil, MCA, MBA(IT), PG Diploma in Cyber Security, PG Diploma in Forensic Science and is pursuing a Ph.D. in Cyber Security. He is certified for CCNA, CCNA Security, MCP, MCSA, MCSE, SCJP, CCI, CEI, CND, CTIA, CEH, ECSA, CHFI, CAST 611, CAST 612, CISM, ISO 27001:2013, Certified Block Chain Expert. He is awarded with BugCrowd MVP and has trained top corporate personnel of Symantec, Quick Heal, BMC Software, Wipro, Cognizant, Syntel, Infosys, Intel, Dell, Fujitsu, Atos, HCL, Accenture, Zensar, Cybage, Samsung, TCS, L&T, John Deere and other 50 plus top Fortune companies. He actively works with DRDO, National Defence Academy - Pune, Pune Police, CID & ATS - Maharashtra. Connect him @ https://www.linkedin.com/in/sadikshaikh

Attacking POP3 using Dictionary Attack

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

Goal:
The goal is to get access to a mailbox. Either to read the mails in the mailbox, or maybe to check if the user has a bad password.

There’s several tools you can use for this. Etc. Ncrack, Medusa og Hydra. Some of these is better than […]

By |November 13th, 2015|Papers|

Post Exploitation and Covering Tracks in Linux Box

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

Introduction

Post-exploitation can basically be divided into two parts.
The first is stealth, and the second is persistence. You could argue exfiltration is another part, but I don’t think it’s necessarily the case. Stealth encompasses the techniques you use to avoid being found by any sysadmins, and persistence […]

By |November 13th, 2015|Papers|

Network Traffic Flow Tutorial for Hackers

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

Credits: Keeper
IntroductionTo begin with, let’s start off from the very beginning. I’ll go through the very basics and fundamentals of networking and reaching to a somewhat decent level of knowledge, concluding with all the detailed aspects of managing networks and servers’ operations.How servers communicate with each […]

By |November 11th, 2015|Papers|

Port Scanning with Metasploit in Kali Linux Penetration testing Distribution (Basic-Mode)

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

I believe you have already downloaded and running Kali Linux . Now to the Point.

1. Open Terminal.
2. Type in below command 

Code:
msfconsole

Msfconsole will start and will open in few seconds. Once msfconsole is up and running Run below command :-

Code:
msf> search portscan

And you will see few lists […]

By |November 10th, 2015|Papers|

Bypass any server even if the security is 100000000% in Extreme Hacking Style (-_-)

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

 

Click on the below link to access the Cheatsheet:

Link: Bypass any server even if the security is 100000000% in Extreme Hacking Style (-_-)

 

More to come stay tunned… \m/

www.extremehacking.org
CEHv9 CHFI ECSAv9 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING […]

By |November 10th, 2015|Papers|

JMeter Web Application Testing Cheatsheet.

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

JMeter is a desktop application that can be used to perform functional testing and load testing.

While the JMeter application itself is designed as pure Java application, it can be used to perform load testing of any kind of web application, including those that are written in […]

By |November 9th, 2015|Papers|

Virtual Machine Adding Memory Cheatsheet

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

 

Click on the below link to access the Cheatsheet:

Link: Virtual Machine Adding Memory Cheatsheet

More to come stay tunned… \m/

 

www.extremehacking.org
CEHv9 CHFI ECSAv9 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE,Certified Ethical Hacking, Center For Advanced Security […]

By |November 9th, 2015|Papers|

New Malwarebytes Anti-Exploit Adds Fingerprinting Detection

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

We just released a new version of our Malwarebytes Anti-Exploit software which is packed with new and advanced exploit detection and blocking techniques, making it the most complete anti-exploit product available in the market today.

New Features:

• Dynamic Anti-HeapSpraying mitigation
• Anti-Exploit fingerprinting mitigation
• Finetuned VBScript mitigation for IE
• […]

By |November 9th, 2015|Papers|

Linux privilege escalation cheatsheet..

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

 

Click on the below link to access the Cheatsheet:

Link: Linux privilege escalation cheatsheet..

More to come stay tunned… \m/

 

www.extremehacking.org
CEHv9 CHFI ECSAv9 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE,Certified Ethical Hacking, Center For Advanced Security Training […]

By |November 8th, 2015|Papers|

Bypass Antivirus Cheatsheet

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

 

Click on the below link to access the Cheatsheet:

Link: Bypass Antivirus Cheatsheet
More to come stay tunned… \m/

 

www.extremehacking.org
CEHv9 CHFI ECSAv9 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE,Certified Ethical Hacking, Center For Advanced Security Training […]

By |November 8th, 2015|Papers|