Yearly Archives: 2016

/2016

Opening For Security Analyst – Delhi

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Job Description
Experience: 2 to 4 Yrs

Good understanding in Vulnerability Assessment and Penetration Testing
Familiarity with Security Standards and groups (OWASP, WASC, SANS Top 25 etc.)
Experience in Application Penetration Testing, Vulnerability Assessment and Source code reviews (both Manual as well automated).
Experience in Internal & External […]

By |May 1st, 2016|job|

Opening for Penetration Tester — Chennai, Bangalore

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Job Code                     :   CI/070416/Security/Chennai

Position                       :  Penetration Tester

Experience                  : 1-3 years

Location                      :  Chennai, Bangalore 

Requirements 

1-3 years’ experience in at least three of the following:

Network penetration testing and manipulation of network infrastructure
Mobile and/or web application assessments
Email, phone, or physical social-engineering assessments
Shell scripting or automation of simple […]

By |May 1st, 2016|job|

Opening for Sr. Malware/Security Researcher Engineer – Pune

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Responsibilities

Take research projects from initial concept commit to development and production ready solutions.
Perform cutting edge analysis of Windows and MAC malwares.
Passionate about reverse engineering and should be interested in taking things apart.
Research the threat landscape to enhance FireEye`s core engine.
Experience in researching and […]

By |May 1st, 2016|job|

How to put login with google in your website

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In this article I am going to show you how to use “login with google” in your website.

Implementing Google Login system in your website is very easy, the Google API Client Library enables us to work with many Google services like Google+, Drive, or […]

By |April 28th, 2016|Papers|

These are the top NoSQL DBMS

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A database which stores data in form of key-value pair is called a relational database. Alright! let me explain myself.

a relational database stores data as tables with numerous rows and columns.(I think this one is easy to understand).

A key is a column (or […]

By |April 28th, 2016|Papers|

New Windows Ransomware Steals Password Before Encrypting It. : ECCOUNCIL PRESENTATION

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Hello every one, this post contains Weekly Presentation from Ec-Council.

Topic from the Presentation: New Windows Ransomware Steals Password Before Encrypting It. 

A paper detailing a new attack vector on TLS was released on December 30. The attack, known as the HTTPS Bicycle Attack, is able to determine the […]

By |April 22nd, 2016|Papers|

Bypassing Antivirus using Veil on Kali Linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Veil is an awesome tool developed by Chris Truncer @ChrisTruncer, Mike Wright @TheMightyShiv and The Grayhound @the_grayhound specifically designed for Kali Linux

Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on […]

By |April 17th, 2016|Papers|

How to sniff password using Wireshark

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Credits: moufid

Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.
This tutorial can be an angel and also devil in […]

By |April 5th, 2016|Papers|

Spoofing MAC Address on Android

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

A Media Access Control address […]

By |April 2nd, 2016|Papers|

Top 10 Android ROMs for customizing your Android device

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Tired of Stock Android firmware then check these 10 Best Custom Android ROMs and try out one of them

What is the meaning of Custom Android ROM : It includes anything from  making changes to the custom codes in such a way so that the Android device starts […]

By |March 19th, 2016|Papers|