Papers

/Papers

A simple program in C that will kill antivirus program

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

Hello friends recently in my CEH(Certified Ethical Hacker) class one of mine student told me that he is finding difficulty in bypassing the antivirus on the victim machine.

So I just gave a thought why not to create a program that will kill antivirus 🙂

Logic flowed through the […]

By |November 1st, 2015|Papers|

C++ for Hackers (Basic Mode)

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

 

This is a Basic Mode Notes for C++, more detail notes are in process. Stay tunned..
This tutorial will thoroughly cover…
Structure of a Basic Program
Comments
Variables. Data Types.
Identifiers
Fundamental data types
Declaration of variables
Scope of variables
Initialization of variables
Introduction to strings
Constants
Literals
Integer Numerals
Floating Point Numbers
Character and string literals
Boolean literals
Defined constants (#define)

Structure of a […]

By |November 1st, 2015|Papers|

A Simple Email Grabber coded in Perl

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

 

This is a supportive Tech for Spear Phishing. You can collect random emails using this script, which can be later used for Spear Phishing. Spear Phishing Detail Practical is Covered in the CEH Module, Which include DNS Injection, DNS Redirection, Port Forwarding and VPN building.

Go through the […]

By |November 1st, 2015|Papers|

HOW TO HACK LIKE A PRO – SHODAN, THE WORLD’S MOST DANGEROUS SEARCH ENGINE

Extreme Hacking | Sadik Shaikh
Advanced Ethical Hacking Institute in Pune

Sometimes, we don’t have a specific target in mind, but rather we are simply looking for vulnerable and easy-to-hack targets anywhere on the planet. Wouldn’t be great if we had a search engine like Google that could help us find these targets? Well, we do, and it’s […]

By |October 27th, 2015|Papers|

Hacking Windows 10 using a simple windows excel file..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Requirements:

– Veil Evasion
– MacroShop

Step 1(Installation):

First you need to install MacroShop and Veil Evasion. Let’s start with MacroShop. So if you haven’t got MacroShop installed just install it with the command:

PHP Code:

git clone https://github.com/khr0x40sh/MacroShop.git

This can take a while. Meanwhile we can install Veil Evasion. So there are different ways to install Veil Evasion […]

By |October 25th, 2015|Papers|

Phpmyadmin Shell Upload Program in perl

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

While going through are CEH labs, one of our student as that what if he got access to a phpmyadmin portal, is it possible to root the server or upload a shell so that he gets a access of the full web server? And my answer was big yeesss.

 

So here […]

By |October 18th, 2015|Papers|

BACKBOX LINUX 4.4 RELEASED!

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

BackBox is an Ubuntu-based Linux distribution penetration test and security assessment oriented providing a network and informatics systems analysis tool-kit. BackBox desktop environment includes a complete set of tools required for ethical hacking and security testing.

The main aim of BackBox is providing an alternative, highly customizable and well performing system. […]

By |October 18th, 2015|Papers|

OSI Model Tutorial

Extreme Hacking
Advanced Ethical Hacking Institute in Pune
Credits: 9tut

Welcome to the most basic tutorial for networker! Understanding about OSI model is one of the most important tools to help you grasp how networking devices like router, switch, PC… work.

Let’s take an example in our real life to demonstrate the OSI model. Maybe you have ever sent a […]

By |October 15th, 2015|Papers|

Wifi adapter packet injection test

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Questions about if a certain Wifi adapter is compatible with the Aircrack-ng suite or what Wifi card is capable of packet injection and operating monitoring mode are commonly asked at discussion boards and social media. A Wifi adapter that is capable of packet injection and monitoring mode is trivial and important functionality to be successful in […]

By |October 6th, 2015|Papers|

Websploit Wifi Jammer

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be exploring the Websploit Wifi Jammer module which we’ve edited to work with the latest version of Kali Linux. The Websploit Wifi Jammer module is a great tool to automatically disconnect every client connected to the targeted wireless network and access point. The WiFi Jammer […]

By |October 6th, 2015|Papers|