Yearly Archives: 2016

/2016

How to Do Burp Fuzzing Using Python

 

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In this article i will show how you can do Burp Fuzzing using Python programming language.

At some point in your career, you may find yourself attacking a web application or web service that
doesn’t allow you to use traditional web application assessment tools. Whether […]

By |June 12th, 2016|Papers|

Bing for Burp Using Python Programming Language

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

When you’re attacking a web server, it’s not uncommon for that single machine to serve several web
applications, some of which you might not be aware of. Of course, you want to discover these
hostnames exposed on the same web server because they might give […]

By |June 12th, 2016|Papers|

Cracking passwords in Kali Linux using Hydra

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Hydra is a very fast connection bruteforer that supports many different services.
It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain […]

By |June 12th, 2016|Papers|

Brute-Forcing HTML Form Authentication Using Python

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In this article i will show how you can brute-force HTML from authentication using python code.

There may come a time in your web hacking career where you need to either gain access to a target,
or if you’re consulting, you might need to assess […]

By |June 12th, 2016|Papers|

Hacking Facebook and WhatsApp signals to track 4G/LTE smartphone’s precise locations

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Researchers make $1400 IMSI catcher which can track any user’s precise location using Facebook and WhatsApp signal

Researchers have made a low-cost gadget to track the precise location of smartphones using 4G/LTE by hacking Facebook and WhatsApp signals. It was earlier thought that though such […]

By |June 9th, 2016|Papers|

How to Hide files or folder in Android smartphones and tablets to maintain your privacy

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Hide Folders on Android devices; learn how to hide files/folders on your Android smartphones and tablets
Easy way to secure your Files and Folders in Android, here is how to hide files and folders on Android devices

Android smartphone has become the greatest boon in […]

By |June 9th, 2016|Papers|

Anonymous DDoS and shutdown London Stock Exchange for two hours

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Anonymous hacktivists take down the London Stock Exchange website for more than two hours as part of protest against world’s banks
The online hacktivist group, Anonymous reportedly shut down the London Stock Exchange (LSE) website last week for more than two hours as part […]

By |June 7th, 2016|Papers|

Top Programming Languages To Future-Proof Your Portfolio

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Top Programming Languages That Will Bag You A Top Notch Job
With several programming languages available in the market, it is very important to choose the ones that can help you plan your future or plan your development teams. There are constant lists about […]

By |June 7th, 2016|Papers|

Russian Superweapon That Can “Switch Off” All Enemy Satellites

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

This time it is Russia that has claimed of a revolutionary superweapon that has the capability to dilapidate enemies’ satellites and the cruise weapons guided by them. It is a means of a modern electronic warfare that causes less human destruction compared to […]

By |June 5th, 2016|Papers|

How JavaScript Functions And Mouse Movements Can Reveal TOR Users’ True Identity

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

TOR browser is used by hundreds of thousands of users — activists, journalists, hackers, and more — all around the world. This anonymity software suite ensures that people are able to save themselves from the prying eyes of governments and hackers. It ensures […]

By |June 5th, 2016|Papers|