Sadik Shaikh

/Sadik Shaikh

About Sadik Shaikh

Mr. Sadik Shaikh is a Technology Evangelist and associated with numerous government and private organizations in Information Security and Cyber Forensics since past sixteen years. He carries a robust technical experience in VAPT for Network, Cloud, Scada, Mobile and Web Applications. He has conducted more than 300+ successful pentest projects. He is acknowledged and listed in "Hackers Hall Of Fame" for finding several security flaws in Department of Defense (DoD), European Cert, Netherland Cert, United Nations, NCIIPC, Microsoft, Apple, Adobe, Yahoo, Twitter, AOL, Amazon, Accenture, Intel, Dell, Lenovo, Mozilla, Opera, Oracle, Mastercard, Western Union, SAP, Sony, Sophos, Rapid7, Alien Vault, eBay, OLX, ISC2, SANS, Blackberry, Vodafone, HTC, AT&T, Nokia, Netgear, Huawei and several of the other 50 plus top Fortune companies. He is an expert and consultant for the Police Department and Defence in solving Cyber Terrorism Cases. He is on CEH Review Board, ECSA/LPT Review Board, CND Review Board, and CAST Review Board. He is MPhil, MCA, MBA(IT), PG Diploma in Cyber Security, PG Diploma in Forensic Science and is pursuing a Ph.D. in Cyber Security. He is certified for CCNA, CCNA Security, MCP, MCSA, MCSE, SCJP, CCI, CEI, CND, CTIA, CEH, ECSA, CHFI, CAST 611, CAST 612, CISM, ISO 27001:2013, Certified Block Chain Expert. He is awarded with BugCrowd MVP and has trained top corporate personnel of Symantec, Quick Heal, BMC Software, Wipro, Cognizant, Syntel, Infosys, Intel, Dell, Fujitsu, Atos, HCL, Accenture, Zensar, Cybage, Samsung, TCS, L&T, John Deere and other 50 plus top Fortune companies. He actively works with DRDO, National Defence Academy - Pune, Pune Police, CID & ATS - Maharashtra. Connect him @ https://www.linkedin.com/in/sadikshaikh

Linux Ransomware creators third time unlucky as researchers crack encryption again

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Researchers find Linux.Encoder 3 version still uses buggy encryption and allows file recovery
Much to the delight of security researchers, a group of malware creators are currently having difficulty getting cryptographic implementations right in their ransomware. This has not happened once but thrice.

A group of cyber criminals […]

By |January 9th, 2016|Papers|

Get Wi-fi passwords without hacking : Basic Mode

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Get Wi-fi Passwords without hacking, its no where a hacking but just for fun and Ignorance..

Requirements:
iPhone or Android

Let’s begin with the tutorial

1- First of all, go to this site with your phone: http://www.wifimap.io/
2- Download and install the App to your device
3- Activate your Wi-fi, and permit […]

By |January 6th, 2016|Papers|

D-Link’s Wireless Twin Routers Ensure That Your Entire House Is Wi-Fi Enabled

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

D-Link comes up with two ugly looking routers that provides Wi-Fi coverage to every corner of your house
Most consumer-level routers cannot create a Wi-Fi network that covers every corner of a large house. As a result, larger homes suffer from poor Wi-Fi connections. To combat this […]

By |January 5th, 2016|Papers|

Top 5 Facebook Scams That You Should Be Aware Of

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The bigger and popular sites with the huge number of visitors are like hackers’ wonderland for posting scams. Especially the users on social media websites are prone to such scams that further convert to dangerous cyber attacks. Facebook has about 1.4 billion users making it potentially the […]

By |January 5th, 2016|Papers|

What is the Blue Screen of Death in Windows – The Complete Guide

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

BSOD or “Blue Screen of Death” is an error message displayed on the screen when Windows OS fails to keep up to its promise of working smoothly without errors, basically, when the operating system crashes due to some reason it shows a Blue Screen of Death.

Let’s […]

By |January 4th, 2016|Papers|

The most popular and most downloaded Chrome Extensions of 2015

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

These are the most popular Chrome Extensions that would enhance your browsing experience
Welcome to the world of amazing Chrome extensions, which has widgets to improve your entertainment quotient, niche plugins with dedicated functionalities and plugins that make web browsing more secure than ever.

Chrome productivity extensions provide […]

By |January 4th, 2016|Papers|

Top ten operating systems for ethical hackers and security researchers

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

A comprehensive list of most popular operating systems among hackers all around the world.

Back in August, we had posted a list of top ten hacker tools. Now we have advanced it one step further to bring you the best operating systems for hackers.
This time it is […]

By |January 3rd, 2016|Papers|

10 Amazing Facts You Didnt Know About Android

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Android, the worlds mostly widely used smartphone operating System is growing day by day with its highly enriched user interface and extensively used mobile applications.  Some are using it as platform to develop applications while the others use it as one of source which connects them […]

By |December 31st, 2015|Papers|

How to Convert a USB Charger Into a Linux Computer

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

In this article, I’m going to tell you about how to make a little Linux computer from a USB charger. It’s a truly portable Linux computer, and I came across it yesterday when I was reading some Linux news on the web.In the past we’ve shared […]

By |December 31st, 2015|Papers|

OS.js Is A New Javascript Based Open Source Operating System Running In Your Browser

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Did you ever wish to use an operating system that ran just like a website inside your web browser? OS.js, a JavaScript-based open source operating system designed for the cloud, is here to provide you this facility.

On its website, OS.js describes itself as a Javascript web […]

By |December 30th, 2015|Papers|