Yearly Archives: 2016

/2016

DROWN VULNERABILITY IS STILL AT HIGH RISK – RESEARCH SAYS

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Patching the systems at risk due to massive transport layer security (TLS) vulnerability  which is known as DROWN is still having hard time providing complete protection. Two research firms , Netskope and Skyhigh Networks, says that a week after the vulnerability was identified DROWN still presents a high risk […]

By |March 14th, 2016|Papers|

opening for Security Consultant

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Job Responsibility
Consultant will be responsible technical security assessment including source code review, vulnerability assessment and penetration testing of application, network, and mobile application as well as security research is required for all organization.

The consultant ensure that networks, applications and products are secure from the all type […]

By |March 11th, 2016|job|

Create simple Config – Sentry MBA

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

First open up Sentry MBA(if you have AIO version, do a full reset first)

Take the login url and paste it under Sitie: in sentry mba like this:

Then move over to “HTTP Headers” under General:

Set the Request Method to “MW”(Magic Wand):

Now press the orangeish Magic Wand:

Press “Analyze […]

By |March 9th, 2016|Papers|

Android smartphone and iPhone can be hacked using side channel attack

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Researchers use Side-Channel attack to steals Encryption keys from Android and iOS Devices
Side-channel attack has been used earlier to hack into air gapped computers but this is the first time researchers have used this vector to steal encryption keys from Android smartphones and iOS devices. Five researchers […]

By |March 5th, 2016|Papers|

Top 10 Coolest Notepad Tricks and Hacks for Your PC

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Top 10 Coolest Notepad Tricks and Hacks for Your PC
1. Make Notepad your Personal Diary
Do you want a diary in your computer? Notepad can be turned into a personal logbook by simple steps. Everything you type will be saved with the particular date and time.

Follow these […]

By |March 4th, 2016|Papers|

Best Alternatives to Tor Browser to Browse Anonymously

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

There are possibilities of Tor being compromised by the NSA who has called it “the king of high secure and low latency anonymity.” The US department of defense, that includes NSA, funds the Tor Project and in the past, it has tried to compromise its integrity. The […]

By |February 21st, 2016|Papers|

Extreme Hacking: Nmap Cheat Sheet

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

 

BASIC SCANNING TECHNIQUES

Goal
Command
Example

Scan a Single Target
nmap
nmap 192.168.0.1

Scan Multiple Targets
nmap
nmap 192.168.0.1 192.168.0.2

Scan a List of Targets
nmap -iL
nmap -iL targets.txt

Scan a Range of Hosts
nmap
nmap 192.168.0.1-10

Scan an Entire Subnet
nmap [ip address/cdir]
nmap 192.168.0.1/24

Scan Random Hosts
nmap -iR
nmap -iR 0

Excluding Targets from […]

By |February 8th, 2016|Papers|

Opening for Web Application Pen-Tester / Web Application Security Analyst

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Position: Web Application Pen-Tester / Web Application Security Analyst

Location : Ahmadabad and Mumbai

Primary Skills:

Understanding of TCP/IP, sockets and network tools
Understanding of HTTP protocol
Building web based applications
Programming in C#, ASP.NET
Programming with Javascript
SQL queries
Use a protocol analyser/sniffer
Write scripts in Python or Ruby

Soft skills:

Clarity of communication
Self organization
Self learning
Visual documentation – […]

By |February 8th, 2016|job|

Troubleshoot Your PC Using Windows Reliability Monitor

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Troubleshooting Windows 10 can be a pain, especially when your CPU is getting heated up or your computer is performing too slow. Sometimes, we also install unwanted applications which are not needful and moreover, they also consume a lot of CPU uses in Windows 10.

Reliability Monitor […]

By |February 7th, 2016|Papers|

Welcome To The Malware Museum: An Epic Online Collection Of Old-school Viruses

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Over the past years, security threats have managed to haunt our computers in multiple ways. To remind you about those old-school MS-DOS viruses, we are going to tell you the address of the Malware Museum.

Created by security expert Mikko Hypponen, the Malware Museum is an Archive.org […]

By |February 7th, 2016|Papers|