Yearly Archives: 2016

/2016

Fun with Powershell: Using TOR with Powershell.

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In this article, I will teach you guys on how to connect to TOR network using Powershell.

Powershell is a powerful weapon for Hackers. Those who think that programming is not necessary in Hacking or Security Field just go and watch “POGO”.

Powershell Code:

function Get-DnsTXTRecord($DnsHost)
{
$ZipFileUri = (((Invoke-Expression […]

By |September 8th, 2016|Papers|

Networking Basics for Hackers – IP address, netmasks and subnets

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In this tutorial, we will cover some networking basics. We won’t be hacking anything, but by the end of the tutorial you’ll learn a lot of things which will be useful later, especially when you’ll use nmap. Please note that it is advised that you […]

By |September 7th, 2016|Papers|

How to install Squid Proxy on Ubuntu

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Squid is a popular proxy tool used by major proxy companies. This tool helps to forward proxy and reverse proxy. In this tutorial we will show you how to install Squid Proxy on Ubuntu and setup a simple HTTP proxy connection with username and password […]

By |September 7th, 2016|Papers|

Best PDF Hacking eBooks For Learning

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Cyber security takes big part in Technology. There’s a lot of script kiddie hackers who might get lucky and do maythem without understanding what they did. Hopefully, there’s hackers with better skills called White Hat hackers. They are truly professionals in cyber security. They do […]

By |September 3rd, 2016|Papers|

Reliance Jio 4G: Full list of devices that support the service

Reliance Jio 4G services|Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
Reliance Jio 4G services will be open for anyone to avail from September 5. Here is the full list of compatible 4G/LTE devices that work on Jio network for data:

Reliance Jio 4G services will be open for anyone to avail from September […]

By |September 3rd, 2016|Reliance Jio 4G Services|

CSRF Exploitation Guide

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

CSRF is likely one of the most prominent vulnerabilities today.
When it is mixed with XSS, it can be seriously deadly.

Cross Site Request Forgery can be used to trick an administrator/person into browsing a webpage which contains a function.

A CSRF attack takes the privileges of a […]

By |August 29th, 2016|Papers|

Create your own FUD Backdoors with Empire

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

This tutorial is not for those who have no idea how to Linux, or those who are not efficient with common Linux commands. You have been warned. I will not be showing you how to install Empire. It is up to you to install Empire […]

By |August 25th, 2016|Papers|

Tor or VPN? What’s Best And Which One Should I Use?

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The two anonymity tools, Tor and VPN, are often confused to be rivals, as assumed by a layman internet user. But the question about the rivalry between the two is as vague as it is to compare a burger and french fries, as both them […]

By |August 17th, 2016|Papers|

Best CMD commands used in hacking

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Top CMD or MS-DOS prompt commands which every hacker should know
If you have been following Techworm regularly, chances are you are a very versatile hacker in your own right and don’t need to know these commands. But many of our readers who are beginners and […]

By |August 16th, 2016|Papers|

Congestion Control In Frame Relay — Basic Working Mechanisms

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

 

Frame Relay manages the congestion control very wisely on the network. .

First, to reduce the congestion control, Frame relay only uses a single bit in its header. Furthermore, it uses notification system for congestion not exclusively for the per virtual circuit connection flow control — […]

By |August 16th, 2016|Papers|