Yearly Archives: 2016

/2016

Hacking Android phone using Metasploit

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Our tutorial for today is how to Hack Android Smartphone  using Metasploit in Kali Linux

what is metasploit ?
metasploit  Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects […]

By |June 15th, 2016|Papers|

Hacking Web Browsers using BeEF

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.

BeEF was developed by a group of developers led by Wade Alcorn. Built on the familiar Ruby on Rails platform, BeEF was developed to […]

By |June 15th, 2016|Papers|

wifi-honey – Kali-Linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

WiFI -honey is a script, the attack can be used to create fake access points using encryption and all monitors with Airodump . It automates the installation process , it creates five interfaces in monitor mode , four are used as access points […]

By |June 15th, 2016|Papers|

cewl wordlist generator on Kali Linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

CEWL (pronounced “cool” ) is a custom word list generator written in Ruby that with a given URL and a specified depth and possibly external links , returns a list of words that can then be used for application bruteforce as john or […]

By |June 15th, 2016|Papers|

Listen to a VOIP call with Wireshark

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Wireshark is a free software protocol analyzer , or ” packet sniffer “, used in troubleshooting and analysis of computer networks, protocol development , education and reverse engineering , but also the piracy.

Voice over IP or “VoIP” for Voice over IP is a […]

By |June 15th, 2016|Papers|

how to install xarp on kali linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

XArp is a security application that uses advanced techniques to detect ARP based attacks.
Through the use of passive and active modules XArp detects attacks internesur your network.
ARP attacks allow an attacker to silently spy or manipulate all data that is sent over the […]

By |June 15th, 2016|Papers|

Burpsuite & Running a basic Web-Spider Kali-Linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Burpsuite is a collection of tools bundled into a single suite made for Web Application Security or Penetration testing. Its a java executable and hence its cross platform. Kali Linux comes with Buprsuite free edition installed. There is also a professional version available. […]

By |June 15th, 2016|Papers|

Xplico – Penetration Testing Tools – Kali Linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The goal of Xplico is extract from an internet traffic capture the applications data contained.
For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t […]

By |June 14th, 2016|Papers|

Setting up VPN in Kali linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data.z

A virtual private network (VPN) extends a […]

By |June 14th, 2016|Papers|

Cracking password using John the Ripper | kali-linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

John the Ripper is a free password cracking software tool. Initially developed for the Unix operating system, it now runs on fifteen different platforms (eleven of which are architecture-specific versions of Unix, DOS, Win32, BeOS, and OpenVMS). It is one of the most […]

By |June 14th, 2016|Papers|