Monthly Archives: September 2016

//September

Beware of fraudulent sites and fake offers misusing Flipkart’s name

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: Flipkart

During The Big Billion Days, stay clear of unauthorized websites and messages claiming to offer you unbelievable deals and discounts. Here’s a tip sheet for safe shopping

Have you recently received an email, SMS or Whatsapp message from a website claiming to advertise unbelievable discounts […]

By |September 30th, 2016|Big Billion Days|

German Military Hacked Afghan Mobile Operator to Discover Hostage’s Whereabouts

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A special cyber unit of the Bundeswehr (German Armed Forces) carried out Germany’s first ever offensive cyber-operation by hacking into the network of an Afghani mobile operator to track the location of a group of kidnappers that had taken hostage a young German woman.

The woman, […]

By |September 25th, 2016|Exploits|

Fun with Powershell: Using TOR with Powershell.

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In this article, I will teach you guys on how to connect to TOR network using Powershell.

Powershell is a powerful weapon for Hackers. Those who think that programming is not necessary in Hacking or Security Field just go and watch “POGO”.

Powershell Code:

function Get-DnsTXTRecord($DnsHost)
{
$ZipFileUri = (((Invoke-Expression […]

By |September 8th, 2016|Papers|

Networking Basics for Hackers – IP address, netmasks and subnets

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In this tutorial, we will cover some networking basics. We won’t be hacking anything, but by the end of the tutorial you’ll learn a lot of things which will be useful later, especially when you’ll use nmap. Please note that it is advised that you […]

By |September 7th, 2016|Papers|

How to install Squid Proxy on Ubuntu

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Squid is a popular proxy tool used by major proxy companies. This tool helps to forward proxy and reverse proxy. In this tutorial we will show you how to install Squid Proxy on Ubuntu and setup a simple HTTP proxy connection with username and password […]

By |September 7th, 2016|Papers|

Best PDF Hacking eBooks For Learning

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Cyber security takes big part in Technology. There’s a lot of script kiddie hackers who might get lucky and do maythem without understanding what they did. Hopefully, there’s hackers with better skills called White Hat hackers. They are truly professionals in cyber security. They do […]

By |September 3rd, 2016|Papers|

Reliance Jio 4G: Full list of devices that support the service

Reliance Jio 4G services|Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
Reliance Jio 4G services will be open for anyone to avail from September 5. Here is the full list of compatible 4G/LTE devices that work on Jio network for data:

Reliance Jio 4G services will be open for anyone to avail from September […]

By |September 3rd, 2016|Reliance Jio 4G Services|