Sadik Shaikh

/Sadik Shaikh

About Sadik Shaikh

Mr. Sadik Shaikh is a Technology Evangelist and associated with numerous government and private organizations in Information Security and Cyber Forensics since past sixteen years. He carries a robust technical experience in VAPT for Network, Cloud, Scada, Mobile and Web Applications. He has conducted more than 300+ successful pentest projects. He is acknowledged and listed in "Hackers Hall Of Fame" for finding several security flaws in Department of Defense (DoD), European Cert, Netherland Cert, United Nations, NCIIPC, Microsoft, Apple, Adobe, Yahoo, Twitter, AOL, Amazon, Accenture, Intel, Dell, Lenovo, Mozilla, Opera, Oracle, Mastercard, Western Union, SAP, Sony, Sophos, Rapid7, Alien Vault, eBay, OLX, ISC2, SANS, Blackberry, Vodafone, HTC, AT&T, Nokia, Netgear, Huawei and several of the other 50 plus top Fortune companies. He is an expert and consultant for the Police Department and Defence in solving Cyber Terrorism Cases. He is on CEH Review Board, ECSA/LPT Review Board, CND Review Board, and CAST Review Board. He is MPhil, MCA, MBA(IT), PG Diploma in Cyber Security, PG Diploma in Forensic Science and is pursuing a Ph.D. in Cyber Security. He is certified for CCNA, CCNA Security, MCP, MCSA, MCSE, SCJP, CCI, CEI, CND, CTIA, CEH, ECSA, CHFI, CAST 611, CAST 612, CISM, ISO 27001:2013, Certified Block Chain Expert. He is awarded with BugCrowd MVP and has trained top corporate personnel of Symantec, Quick Heal, BMC Software, Wipro, Cognizant, Syntel, Infosys, Intel, Dell, Fujitsu, Atos, HCL, Accenture, Zensar, Cybage, Samsung, TCS, L&T, John Deere and other 50 plus top Fortune companies. He actively works with DRDO, National Defence Academy - Pune, Pune Police, CID & ATS - Maharashtra. Connect him @ https://www.linkedin.com/in/sadikshaikh

How To Hack QR Code Of “Whatsapp Web” Using Phishing Technique In Kali Linux

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Whatsapp is the one of most popular messaging application available for almost all the operating system like windows,android,mac,blackberry etc…

For providing the access of whatsapp on browser,launched the whatsapp web,secured and protected with End To End Encryption.

There […]

By |December 17th, 2016|Papers|

Here’s How Your Sleeping Mac Can Be Hacked In 30 Seconds

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Last month, we told you how the Chinese security researchers were able to crack the security of Windows 10 browser, Adobe Flash, Safari, etc. in few seconds. This was followed by another news in December that […]

By |December 17th, 2016|Papers|

How To Repair Damaged/Corrupt MS Word, Excel, PowerPoint, And Outlook Files

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
How to restore damaged or corrupt MS Word documents
Recovering the damaged or corrupt MS Word files isn’t something that any conventional data recovery software can accomplish. For this, you need to use some special tool. Here, I’m […]

By |December 17th, 2016|Papers|

How To Delete File Permanently Without Sending It To Recycle Bin In Windows 10?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

When you delete a file or folder in Microsoft Windows, it goes to a special folder called Recycle Bin. Recycle Bin allows you to restore your deleted files, in case, you change your mind at a […]

By |December 17th, 2016|Papers|

ShellcodeCompiler C/C++ Compiler For Windows

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Shellcode Compiler is a program that compiles C/C++ style code into a small, position-independent and NULL-free shellcode for Windows. It is possible to call any Windows API function in a user-friendly way. It takes as input a source […]

By |December 5th, 2016|Papers|

How to Make a Bootable USB Flash Drive using Command Prompt

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Creating a USB pen drive using command prompt is not hard, it is one of the most common ways to create a bootable USB.

      This method does not work if your operating system is windows XP or windows 8 […]

By |December 4th, 2016|Papers|

idb – iOS App Security Assessment Tool

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

idb a tool to simplify some common tasks for iOS app security assessments and research.
Requirements:

Ubuntu or OS X
Ruby 1.9.3 or 2.1

Installation:
For OS X:
brew install qt cmake usbmuxd libimobiledevice
For Ubuntu:
apt-get install cmake libqt4-dev git-core libimobiledevice-utils libplist-utils […]

By |December 4th, 2016|Papers|

What Are DLL Files? Can I Download DLL Files From Internet To Fix Windows Errors?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In Windows-based PCs, very often we come across DLL file errors that don’t allow some software to run. We get error messages telling us that some particular .DLL file is missing. To solve this issue, we […]

By |December 3rd, 2016|Papers|

Here is How to Enable System Restore in Windows 10

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The System restore feature is the one that lets you go back in time and undo the changes made. Mysteriously, this feature is disabled in Windows  10 by default. We ae not sire tif this is an […]

By |December 3rd, 2016|Papers|

Vproxy – Forward HTTP/S Traffic To Proxy Instance

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Vproxy is a python script tool which configures a PPTP VPN server that will redirect HTTP/HTTPS traffic to your proxy instance host.
System Requirements:

Kali Linux or any Linux distribution

Installation:
pip install termcolor
How to use:
Step 1: Setup VPN […]

By |November 30th, 2016|Papers|