Papers

Home » Papers

VOLATILITY V2.6 – AN ADVANCED MEMORY FORENSICS FRAMEWORK.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely […]

By |April 26th, 2017|Papers|

creak – Poison, Reset, Spoof, Redirect MITM Script

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Performs some of the most famous MITM attack on target addresses located in a local network. Among these, deny navigation and download capabilities of a target host in the local network performing an ARP poison attack […]

By |April 26th, 2017|Papers|

GIANT_BACKDOOR – WINDOWS BACKDOOR DIAGNOSTIC TOOL.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Detect and uninstall the sticky keys, utility manager, narrator, on-screen keyboard, magnifier, and display switch backdoors, which allows unauthorized access to a system level command prompt at the login screen. Checks if setch.exe, utilman.exe, narrator.exe, osk.exe, […]

By |April 25th, 2017|Papers|

Brutal Toolkit – Create various Payload, PowerShell Attack, Virus Attack and Launch Listener for a HID

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Brutal is extremely useful for executing scripts on a target machine without the need for human-to-keyboard interaction ( HID -ATTACK ) .When you insert the device, it will be detected as a keyboard, and using the […]

By |April 25th, 2017|Papers|

Forward HTTP/S Traffic To Proxy Instance Via Vproxy

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
If you are familiar with mobile penetration testing and you did one before, you probably came across this kind of situation when you want to intercept the application HTTP or HTTPS traffic using your favourite proxy […]

By |April 25th, 2017|Papers|

Exploiting Windows Credentials In Memory

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

PowerMemory is a PowerShell based tool to exploit Windows credentials present in files and memory, it levers Microsoft signed binaries to hack Windows.

The method is totally new. It proves that it can be extremely easy to […]

By |April 14th, 2017|Papers|

Installing Framework for Man-In-The-Middle attacks in Kali

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Installing MITMf
Note: if you’re rocking Arch Linux: you’re awesome! Just remember to use pip2 instead of pip outside of the virtualenv

Install virtualenvwrapper:

pip install virtualenvwrapper

Edit your .bashrc or .zshrc file to source the virtualenvwrapper.sh script:

source […]

By |April 14th, 2017|Papers|

Intercepting DHCP Requests using DHCPOPTINJ

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

DHCP option injector
Full Credit: Andreas Misje

Have you ever wanted to intercept DHCP requests and squeeze in a few extra DHCP options, unbeknownst to the sender? Probably not. However, should the need ever come, dhcpoptinj will (hopefully) help […]

By |April 13th, 2017|Papers|

MorphAES – World’s first polymorphic shellcode engine

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

MorphAES
IDPS & SandBox & AntiVirus STEALTH KILLER.

MorphAES is the world’s first polymorphic shellcode engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS, it’s cross-platform as well and library-independent.

Properties:

Polymorphism […]

By |April 13th, 2017|Papers|

Umbrella – A Phishing Dropper designed to Pentest.

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Umbrella Dropper
Full Credits: Alisson Moretto 
Copyright 2017: Alisson Moretto

Umbrella is a file dropper dedicated to pentest, its download files on target system are execute them without a double execution of exe, only of embed.

To compromise the same target […]

By |April 13th, 2017|Papers|