Sadik Shaikh

/Sadik Shaikh

About Sadik Shaikh

Mr. Sadik Shaikh is a Technology Evangelist and associated with numerous government and private organizations in Information Security and Cyber Forensics since past sixteen years. He carries a robust technical experience in VAPT for Network, Cloud, Scada, Mobile and Web Applications. He has conducted more than 300+ successful pentest projects. He is acknowledged and listed in "Hackers Hall Of Fame" for finding several security flaws in Department of Defense (DoD), European Cert, Netherland Cert, United Nations, NCIIPC, Microsoft, Apple, Adobe, Yahoo, Twitter, AOL, Amazon, Accenture, Intel, Dell, Lenovo, Mozilla, Opera, Oracle, Mastercard, Western Union, SAP, Sony, Sophos, Rapid7, Alien Vault, eBay, OLX, ISC2, SANS, Blackberry, Vodafone, HTC, AT&T, Nokia, Netgear, Huawei and several of the other 50 plus top Fortune companies. He is an expert and consultant for the Police Department and Defence in solving Cyber Terrorism Cases. He is on CEH Review Board, ECSA/LPT Review Board, CND Review Board, and CAST Review Board. He is MPhil, MCA, MBA(IT), PG Diploma in Cyber Security, PG Diploma in Forensic Science and is pursuing a Ph.D. in Cyber Security. He is certified for CCNA, CCNA Security, MCP, MCSA, MCSE, SCJP, CCI, CEI, CND, CTIA, CEH, ECSA, CHFI, CAST 611, CAST 612, CISM, ISO 27001:2013, Certified Block Chain Expert. He is awarded with BugCrowd MVP and has trained top corporate personnel of Symantec, Quick Heal, BMC Software, Wipro, Cognizant, Syntel, Infosys, Intel, Dell, Fujitsu, Atos, HCL, Accenture, Zensar, Cybage, Samsung, TCS, L&T, John Deere and other 50 plus top Fortune companies. He actively works with DRDO, National Defence Academy - Pune, Pune Police, CID & ATS - Maharashtra. Connect him @ https://www.linkedin.com/in/sadikshaikh

Hacking Facebook and WhatsApp signals to track 4G/LTE smartphone’s precise locations

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Researchers make $1400 IMSI catcher which can track any user’s precise location using Facebook and WhatsApp signal

Researchers have made a low-cost gadget to track the precise location of smartphones using 4G/LTE by hacking Facebook and WhatsApp signals. It was earlier thought that though such […]

By |June 9th, 2016|Papers|

How to Hide files or folder in Android smartphones and tablets to maintain your privacy

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Hide Folders on Android devices; learn how to hide files/folders on your Android smartphones and tablets
Easy way to secure your Files and Folders in Android, here is how to hide files and folders on Android devices

Android smartphone has become the greatest boon in […]

By |June 9th, 2016|Papers|

Anonymous DDoS and shutdown London Stock Exchange for two hours

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Anonymous hacktivists take down the London Stock Exchange website for more than two hours as part of protest against world’s banks
The online hacktivist group, Anonymous reportedly shut down the London Stock Exchange (LSE) website last week for more than two hours as part […]

By |June 7th, 2016|Papers|

Top Programming Languages To Future-Proof Your Portfolio

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Top Programming Languages That Will Bag You A Top Notch Job
With several programming languages available in the market, it is very important to choose the ones that can help you plan your future or plan your development teams. There are constant lists about […]

By |June 7th, 2016|Papers|

Russian Superweapon That Can “Switch Off” All Enemy Satellites

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

This time it is Russia that has claimed of a revolutionary superweapon that has the capability to dilapidate enemies’ satellites and the cruise weapons guided by them. It is a means of a modern electronic warfare that causes less human destruction compared to […]

By |June 5th, 2016|Papers|

How JavaScript Functions And Mouse Movements Can Reveal TOR Users’ True Identity

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

TOR browser is used by hundreds of thousands of users — activists, journalists, hackers, and more — all around the world. This anonymity software suite ensures that people are able to save themselves from the prying eyes of governments and hackers. It ensures […]

By |June 5th, 2016|Papers|

Make Your Smartphone Spy-Proof With Edward Snowden

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Edward Snowden Teaches You How To Make Your Smartphone Spy-Proof
Edward Snowden, a former NSA contractor and a serial whistleblower, has been in the news for the past few years for his famous leak of thousands of documents that disclosed the extent of the […]

By |June 5th, 2016|Papers|

How To Hack WhatsApp Using SS7 Flaw

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Researchers are easily able to hack WhatsApp and Telegram using the known telecom flaw
We continuously receive queries from readers about how to hack WhatsApp. The world’s most popular cross platform messaging App is seen to be ultimatehack by many because it has recently enabled 256-bit […]

By |June 3rd, 2016|Papers|

The Original Hacker’s Dictionary

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The Original Hacker’s Dictionary
[This file, jargon.txt, was maintained on MIT-AI for many years, before being published by Guy Steele and others as the Hacker’s Dictionary. Many years after the original book went out of print, Eric Raymond picked it up, updated it and […]

By |June 3rd, 2016|Papers|

Seven Ways in Which You Can Bypass Android’s Secured Lock Screen

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

You Can Bypass Android’s Secured Lock Screen In These 7 Ways
To prevent unwanted access to your phone such as keeping strangers (or friends) from checking out your messages or private pictures, it always sensible to enable certain security measures. The most commonly used […]

By |May 29th, 2016|Papers|