Papers

/Papers

Nmap Command Guide — ExtremeHacking

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: nmap.org
Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users.

The […]

By |May 1st, 2016|Papers|

Mass Email Attack using Kali

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Mass email senders is not a new topic for ethical hacking community . Certainly we need to send mass emails during penetration test / phishing tests (to be more specific) . While Phishing tests penetration testers often need to send Bulk emails to […]

By |May 1st, 2016|Papers|

How to put login with google in your website

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

In this article I am going to show you how to use “login with google” in your website.

Implementing Google Login system in your website is very easy, the Google API Client Library enables us to work with many Google services like Google+, Drive, or […]

By |April 28th, 2016|Papers|

These are the top NoSQL DBMS

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A database which stores data in form of key-value pair is called a relational database. Alright! let me explain myself.

a relational database stores data as tables with numerous rows and columns.(I think this one is easy to understand).

A key is a column (or […]

By |April 28th, 2016|Papers|

New Windows Ransomware Steals Password Before Encrypting It. : ECCOUNCIL PRESENTATION

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Hello every one, this post contains Weekly Presentation from Ec-Council.

Topic from the Presentation: New Windows Ransomware Steals Password Before Encrypting It. 

A paper detailing a new attack vector on TLS was released on December 30. The attack, known as the HTTPS Bicycle Attack, is able to determine the […]

By |April 22nd, 2016|Papers|

Bypassing Antivirus using Veil on Kali Linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Veil is an awesome tool developed by Chris Truncer @ChrisTruncer, Mike Wright @TheMightyShiv and The Grayhound @the_grayhound specifically designed for Kali Linux

Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on […]

By |April 17th, 2016|Papers|

How to sniff password using Wireshark

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Credits: moufid

Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.
This tutorial can be an angel and also devil in […]

By |April 5th, 2016|Papers|

Spoofing MAC Address on Android

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

A Media Access Control address […]

By |April 2nd, 2016|Papers|

Top 10 Android ROMs for customizing your Android device

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Tired of Stock Android firmware then check these 10 Best Custom Android ROMs and try out one of them

What is the meaning of Custom Android ROM : It includes anything from  making changes to the custom codes in such a way so that the Android device starts […]

By |March 19th, 2016|Papers|

DROWN VULNERABILITY IS STILL AT HIGH RISK – RESEARCH SAYS

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Patching the systems at risk due to massive transport layer security (TLS) vulnerability  which is known as DROWN is still having hard time providing complete protection. Two research firms , Netskope and Skyhigh Networks, says that a week after the vulnerability was identified DROWN still presents a high risk […]

By |March 14th, 2016|Papers|