Yearly Archives: 2016

/2016

Session Layer Of OSI Model: Basics Of Protocols, Authentication And Authorization

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

As we talked earlier in the article OSI Model and its 7 layers, the session layer is an important layer as it is responsible for maintaining, authorizing and authenticating a session between two end-user applications.

Have you ever wondered how your PC maintains a connection […]

By |May 15th, 2016|Papers|

How To Use Netstat Commands To Monitor Network On Windows Using CMD

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

We often seek the help of a program or a tool in doing small things in our Windows like cleaning a drive, managing the firewall etc. However, these things, up to a level, are also possible if you are aware of the basic […]

By |May 15th, 2016|Papers|

Introduction and Architecture of Android

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Today I will tell you what Android is. Many of my candidates asked me what actually Android consist of?

So here we go, Android is a Mobile Platform which consists of 3 things:

Operating System
Middle Ware
Key Applications.

Any electronic device consist of 2 things:

Hardware
Software

The Software Components can […]

By |May 13th, 2016|Papers|

How to Remove Shortcut Virus in 3 Easy Ways

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

What is Shortcut Virus?

Shortcut-virus is a virus which Enters in to your Pen drive, PC, Hard Disk, Memory cards or mobile phone and change your files into shortcuts with the original folder icons.

When you Plugin your Pen drive in Your friend’s Shortcut-Virus affected PC or when […]

By |May 13th, 2016|Papers|

Heartbleed Vulnerability exploitation using Kali

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The Heartbleed vulnerability enables a hacker to trick OpenSSL by sending a single byte of data while telling the server it sent 64K bytes of data. The server will then send back 64K bytes of data to be checked and echoed back. The server will […]

By |May 11th, 2016|Papers|

Application Layer Of OSI Model For Beginners

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

As we talked earlier in the article OSI Model and its 7 layers, the application layer becomes one of the most important layers of the OSI model because it is fundamentally responsible for the communication of the applications running at the applicaiton layer.
Application Layer:
Application is the […]

By |May 8th, 2016|Papers|

New BlackArch Linux version released, now provides 1400 pentesting tools

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

BlackArch Linux version 2016.04.28 released for ethical hackers and security researchers with 1400 pentesting tools

If you are an ethical hacker or a security researcher, this news will undoubtedly interest you. The BlackArch Linux devs have released-the new ISO image of the Arch Linux-based operating system […]

By |May 3rd, 2016|Papers|

Nmap Command Guide — ExtremeHacking

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: nmap.org
Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users.

The […]

By |May 1st, 2016|Papers|

Mass Email Attack using Kali

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Mass email senders is not a new topic for ethical hacking community . Certainly we need to send mass emails during penetration test / phishing tests (to be more specific) . While Phishing tests penetration testers often need to send Bulk emails to […]

By |May 1st, 2016|Papers|

Opening for Sr Security Engineer — Hyderabad

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

POSITION SUMMARY

This role is very important and critical in defining and maintain security framework in and around information systems within the organization. The position requires deep understanding of how things in security industry with extreme granular details of attack patterns, design of thwart […]

By |May 1st, 2016|job|