Papers

/Papers

Searching Exploits directly from Microsoft site.

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this article, I will show you guys how to search Exploits directly from Microsoft site..

 

Step 1: Navigate to Microsoft’s Technet

Too more than 90% of all PCs on the planet run a form Microsoft’s universal Windows working framework (despite the fact that it may shock you that more than 60% […]

By |September 12th, 2015|Papers|

Common Types of Password Cracking Methods..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Social Engineering:

Social engineering is when a hacker takes advantage of trusting human beings to get information from them. For example, if the hacker was trying to get the password for a co-workers computer, he could call the co-worker pretending to be from the IT department. Social Engineering is used for […]

By |September 9th, 2015|Papers|

How to use Google Translate as a proxy

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Not sure if many people know about this but you can use Google Translate as a proxy:

To show it works:

www.extremehacking.org
CEHv8 CHFIv8 ECSAv8 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE,Certified Ethical Hacking, Center For Advanced Security Training in […]

By |September 7th, 2015|Papers|

Flash player SE spread method..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

I have made a simple method to spread your server with Flash player social engineering.
The victim will see a notification that they have outdated Flash Player and to stay secure they have to update their Flash Player.

What actually will happen:
They download your binded server with a real Flash Player update.
And […]

By |September 7th, 2015|Papers|

Cracking Remote Desktops new Style..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

We Will Need Multiple Things To Get Our Selves Started.
-Nmap
-DuBrute
-A Good Username + Password List

Step 1:
The first thing we will have to do is run the Nmap Setup. Dont worry it does not come with any adware.

Step 2:
Ok so in the zip i provided head over to the directory and […]

By |September 7th, 2015|Papers|

Hacking Satellites and GPS..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune
Let’s begin with a little into on what this is all about.

What Is a Satellite?

A satellite is a moon, planet or machine that orbits a planet or star. For example, Earth is a satellite because it orbits the sun. Likewise, the moon is a satellite because it orbits Earth. Usually, […]

By |September 1st, 2015|Papers|

Basic Terminologies used in Ethical Hacking..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

AV – Antivirus is software installed on most computers to protect the computer from viruses
Backdoor – A program running on a host that we “own” so that we can connect to it at a later time even if the vulnerability is patched. For example, cryptcat is a backdoor with a […]

By |August 31st, 2015|Papers|

Rooting a linux box metasploit style..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Today I’ll be writing a guide on how to exploit Metasploitable with the Metasploit Framework. Who is this tutorial for? This tutorial is for anyone who is interested in beginning a journey as a Penetration Tester. This tutorial will encompass:

A nice overview on how to use the Metasploit Framework by […]

By |August 31st, 2015|Papers|

How to remember your passwords easily

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Hello everyone,

Today I’m going to write this tutorial because I’m pretty sure that many of you have this problem and also for security matters.

What I will be covering is how to remember ALL your passwords to every website that you are a member of without much effort.

It’s very easy. It […]

By |August 31st, 2015|Papers|

HIJACK WhatsApp through Android..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Need:

1) Victim MAC id
2) Rooted Android Mobile
3) Busybox Apk
4) Terminal Apk

1> Get Victim MAC id XX:XX:XX:XX:XX:XX

On an Android, find this in Settings → About phone → Status → Wi-Fi MAC address.
On an iPhone, go to Settings → General → About → Wi-Fi Address.
On a Windows phone, look in Settings → […]

By |August 25th, 2015|Papers|