Yearly Archives: 2016

/2016

What is DNS (Domain Name System) and How it Works ?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Most of us are quite familiar with the term DNS or Domain Name System. DNS can be thought of as an attendance register for various websites present over the internet. In the case of DNS, it maintains the database of all the websites […]

By |June 23rd, 2016|Papers|

Google and Udacity’s new Android programming course for beginners

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Learn Android programming with Google and Udacity’s Android Nanodegree program
In an effort to help more people learn programming particularly for its Android platform, the search giant has partnered with Udacity, the online education company, to provide an Android Basics Nanodegree (available in a […]

By |June 23rd, 2016|Papers|

This neat Chrome hack will work for everyone who keep lots of tabs open

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Everyone who uses a lot of Chrome tabs could use this neat little trick to free up memory
Everyone who likes Chrome including me, often keep several tabs open at any single time. Some of the geeky ones may even have hundreds of Google […]

By |June 22nd, 2016|Papers|

What is a Firewall? What does it do?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A firewall is a system that provides network security by filter incoming and outgoing network visits based on a set of user-defined limitations. In general, the sole-purpose of a firewall is to reduce or eliminate the occurrence of unwanted network data while allowing all legitimate communication […]

By |June 22nd, 2016|Papers|

10 Private Search Engines That Do Not Track You

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Private browsing using the private or incognito modes provided in your browser, does not give you the level of privacy you think it does. If you really don’t want to be tracked and also don’t want anyone tracking your searches, try these search […]

By |June 15th, 2016|Papers|

Exploit SQL Injection Using Sqlmap in kali linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

SQL injection : it is an attack that exploits non-parametrized SQL queries in a database , so that the attacker can insert their own queries.

Sqlmap : This is a very powerful penetration test tool (open source) , it automates the discovery and exploitation […]

By |June 15th, 2016|Papers|

How to Use Armitage For Discovering Vulnerabilities

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Armitage is a graphical interface to Metasploit , developed in Java (multiplatform )to visualize the target machines , recommended exploits and functionality advanced framework metasploit .

Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only […]

By |June 15th, 2016|Papers|

Scan website for vulnerabilities using Vega in Kali Linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Vega is an open source platform for testing the security of web applications. Vega can help you find and validate SQL injections , cross-site scripting (XSS) , inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java , GUI -based , […]

By |June 15th, 2016|Papers|

Man in the middle attacks tutorial

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

MITM attacks (Man -In-The -Middle )
MITM are attacks where the attacker places themself between a “victim machine” and the “router”, this  generally occurs without the knowledge of the victim.

A MITM attack exploits the real-time packets in transit allowing attackers to intercept, send and receive data never […]

By |June 15th, 2016|Papers|

How to sniff password using Wireshark

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.
This tutorial can be an angel and […]

By |June 15th, 2016|Papers|