Papers

/Papers

Pentesting firewall with Hping3

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

1. Testing ICMP: In this example hping3 will behave like a normal ping utility, sending ICMP-echo und receiving ICMP-reply
hping3 -1 0daysecurity.com
2. Traceroute using ICMP: This example is similar to famous utilities like tracert (windows) or traceroute (linux) who uses ICMP packets increasing every […]

By |May 22nd, 2016|Papers|

Hacking Web App using Burp Suite — A Short Guide

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: PrimalSec

Web Application Testing Overview:

Web application vulnerabilities offer a large amount of risk to enterprise systems.  Many web application vulnerabilities are a result of lack of input sanitization to the web application.  In short, web applications leverage some form of input from the […]

By |May 22nd, 2016|Papers|

This 25 year old hacker makes $100,000 a year moonlighting as ‘bug bounty’ hunter

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

25 year-old cofounder of HackerOne makes $100,000 a year from finding bugs
Bugs are a major pain to the tech industry because a single unpatch bug can mean a worrisome data leak of millions of users of that particular product. Hunting for bugs by […]

By |May 17th, 2016|Papers|

Session Layer Of OSI Model: Basics Of Protocols, Authentication And Authorization

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

As we talked earlier in the article OSI Model and its 7 layers, the session layer is an important layer as it is responsible for maintaining, authorizing and authenticating a session between two end-user applications.

Have you ever wondered how your PC maintains a connection […]

By |May 15th, 2016|Papers|

How To Use Netstat Commands To Monitor Network On Windows Using CMD

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

We often seek the help of a program or a tool in doing small things in our Windows like cleaning a drive, managing the firewall etc. However, these things, up to a level, are also possible if you are aware of the basic […]

By |May 15th, 2016|Papers|

Introduction and Architecture of Android

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Today I will tell you what Android is. Many of my candidates asked me what actually Android consist of?

So here we go, Android is a Mobile Platform which consists of 3 things:

Operating System
Middle Ware
Key Applications.

Any electronic device consist of 2 things:

Hardware
Software

The Software Components can […]

By |May 13th, 2016|Papers|

How to Remove Shortcut Virus in 3 Easy Ways

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

What is Shortcut Virus?

Shortcut-virus is a virus which Enters in to your Pen drive, PC, Hard Disk, Memory cards or mobile phone and change your files into shortcuts with the original folder icons.

When you Plugin your Pen drive in Your friend’s Shortcut-Virus affected PC or when […]

By |May 13th, 2016|Papers|

Heartbleed Vulnerability exploitation using Kali

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

The Heartbleed vulnerability enables a hacker to trick OpenSSL by sending a single byte of data while telling the server it sent 64K bytes of data. The server will then send back 64K bytes of data to be checked and echoed back. The server will […]

By |May 11th, 2016|Papers|

Application Layer Of OSI Model For Beginners

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

As we talked earlier in the article OSI Model and its 7 layers, the application layer becomes one of the most important layers of the OSI model because it is fundamentally responsible for the communication of the applications running at the applicaiton layer.
Application Layer:
Application is the […]

By |May 8th, 2016|Papers|

New BlackArch Linux version released, now provides 1400 pentesting tools

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

BlackArch Linux version 2016.04.28 released for ethical hackers and security researchers with 1400 pentesting tools

If you are an ethical hacker or a security researcher, this news will undoubtedly interest you. The BlackArch Linux devs have released-the new ISO image of the Arch Linux-based operating system […]

By |May 3rd, 2016|Papers|