Papers

/Papers

Basic Malware Analysis Tools

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In the upcoming 6 hacking tutorials we will be talking about basic malware analysis and we will start with discussing the many different Basic Malware Analysis Tools which are available. A Malware Analyst is someone highly skilled in reverse engineering malware to get a deep understanding about what a certain piece of malware does and how it […]

By |October 6th, 2015|Papers|

Trojan Threatens Linux Networks

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Credits: Oliver Freeman

The Security Intelligence Response Team issued a high-risk threat advisory for XOR DDoS proliferation.

The XOR DDoS Trojan is used to hijack Linux servers to build a botnet for distributed denial-of-service attacks with SYN and DNS floods.

The massive Linux-based botnet, which they discovered last year, can take down websites under […]

By |October 6th, 2015|Papers|

How to Hack and Decrypt WhatsApp Database (Remotely) [ROOT]

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

WhatsApp?
Almost everyone knows about it. It is a social android application, that’s enables the user to send free messages through the internet within seconds. The developers have made huge success and have high level and complex algorithms to encrypt and store the data, which changes with every update! And hence […]

By |October 6th, 2015|Papers|

Windows 8 Remote Explorer Kill with Shell Code

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This post will elaborate how to take down a Explorer with help of shellcode. In CEH class we had created a dropper with exe extension, this is a more advance dropper that can be used to inject any process for the current example I have taken a explorer process.

The assembly […]

By |September 20th, 2015|Papers|

Inserting Fake Update DNS in Windows 8 through shellcode

 

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

This post will elaborate how to add a fake update DNS with help of shellcode. In CEH class we have already seen how metasploit can be used to make changes in DNS, this is a more advance dropper that can be used to inject any process for the current example […]

By |September 20th, 2015|Papers|

Windows 10 Remote Explorer Kill with Shell Code

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This post will elaborate how to take down a Explorer with help of shellcode. In CEH class we had created a dropper with exe extension, this is a more advance dropper that can be used to inject any process for the current example I have taken a explorer process.

The assembly […]

By |September 15th, 2015|Papers|

Secure your websites from DDOS attack in just one minute..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this article, I will teach you guys on how you could secure your websites from DDOS in just one minute.

 

Simply paste the following code below in your root directory:

<?php
/*
#####################################################
# Script: DDOS Security By Extreme Hacking #
#####################################################
*/

$ Ad_ddos_query = 10, / / ​​number of requests per second to detect DDOS attacks
$ […]

By |September 14th, 2015|Papers|

Secure your website just in one minute..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

In this article, I will teach you guys on how you could secure your websites in just one minute.

 

Simply create a file named as .htaccess and paste the following code below:

#####################################################
# Script: htaccess Security By Extreme Hacking #
#####################################################
# No web server version and indexes
ServerSignature Off
Options -Indexes
# Enable rewrite engine
RewriteEngine On
# Block […]

By |September 14th, 2015|Papers|

Fun with Powershell: Using TOR with Powershell.

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this article, I will teach you guys on how to connect to TOR network using Powershell.

Powershell is a powerful weapon for Hackers. Those who think that programming is not necessary in Hacking or Security Field just go and watch “POGO”.

 

Powershell Code:

function Get-DnsTXTRecord($DnsHost)
{
$ZipFileUri = (((Invoke-Expression “nslookup -querytype=txt $DnsHost 8.8.8.8”) -match […]

By |September 12th, 2015|Papers|

Google Translator Exploit for hacking Google accounts..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Google is our companion, however regardless it has its defects as everything has a tendency to. A bit known blemish inside the media monster permits phishing to occur on Google accounts that would totally sidestep propelled web assurance programs in client’s programs and also different assurances that have been placed […]

By |September 12th, 2015|Papers|