Papers

/Papers

Create simple Config – Sentry MBA

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

First open up Sentry MBA(if you have AIO version, do a full reset first)

Take the login url and paste it under Sitie: in sentry mba like this:

Then move over to “HTTP Headers” under General:

Set the Request Method to “MW”(Magic Wand):

Now press the orangeish Magic Wand:

Press “Analyze […]

By |March 9th, 2016|Papers|

Android smartphone and iPhone can be hacked using side channel attack

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Researchers use Side-Channel attack to steals Encryption keys from Android and iOS Devices
Side-channel attack has been used earlier to hack into air gapped computers but this is the first time researchers have used this vector to steal encryption keys from Android smartphones and iOS devices. Five researchers […]

By |March 5th, 2016|Papers|

Top 10 Coolest Notepad Tricks and Hacks for Your PC

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Top 10 Coolest Notepad Tricks and Hacks for Your PC
1. Make Notepad your Personal Diary
Do you want a diary in your computer? Notepad can be turned into a personal logbook by simple steps. Everything you type will be saved with the particular date and time.

Follow these […]

By |March 4th, 2016|Papers|

Best Alternatives to Tor Browser to Browse Anonymously

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

There are possibilities of Tor being compromised by the NSA who has called it “the king of high secure and low latency anonymity.” The US department of defense, that includes NSA, funds the Tor Project and in the past, it has tried to compromise its integrity. The […]

By |February 21st, 2016|Papers|

Extreme Hacking: Nmap Cheat Sheet

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

 

BASIC SCANNING TECHNIQUES

Goal
Command
Example

Scan a Single Target
nmap
nmap 192.168.0.1

Scan Multiple Targets
nmap
nmap 192.168.0.1 192.168.0.2

Scan a List of Targets
nmap -iL
nmap -iL targets.txt

Scan a Range of Hosts
nmap
nmap 192.168.0.1-10

Scan an Entire Subnet
nmap [ip address/cdir]
nmap 192.168.0.1/24

Scan Random Hosts
nmap -iR
nmap -iR 0

Excluding Targets from […]

By |February 8th, 2016|Papers|

Troubleshoot Your PC Using Windows Reliability Monitor

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Troubleshooting Windows 10 can be a pain, especially when your CPU is getting heated up or your computer is performing too slow. Sometimes, we also install unwanted applications which are not needful and moreover, they also consume a lot of CPU uses in Windows 10.

Reliability Monitor […]

By |February 7th, 2016|Papers|

Welcome To The Malware Museum: An Epic Online Collection Of Old-school Viruses

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Over the past years, security threats have managed to haunt our computers in multiple ways. To remind you about those old-school MS-DOS viruses, we are going to tell you the address of the Malware Museum.

Created by security expert Mikko Hypponen, the Malware Museum is an Archive.org […]

By |February 7th, 2016|Papers|

How to Install Linux On Your Android Phone Without Rooting

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Canonical is betting big on its official Ubuntu smartphones and working hard to hit the Convergence right spot. However, if you don’t want to go to the market to buy a phone running a Linux distro and you want to use a version other than Ubuntu Phone, […]

By |February 7th, 2016|Papers|

10 Best Operating Systems For Ethical Hacking And Penetration Testing

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

It’s time to pause the archaic Windows vs. OS X vs. Linux discussion and switch over to some advanced operating systems dedicated to pen testing and ethical hacking. A security-focused operating system is a hacker’s best friend as it helps them to detect the weaknesses in […]

By |February 1st, 2016|Papers|

Here’s how a cheap webcam can be converted into network backdoor

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

This is how a $30 D-Link webcam can be converted into a backdoor
Researchers at US security firm Vectra Networks have hacked a ‘tiny’ D-Link web camera and demonstrated how it can be abused by cybercriminals and turned into a medium to steal data or for sending additional […]

By |January 18th, 2016|Papers|