Papers

/Papers

Difference between 2G, 3G, 3.5G, 4G..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

 

www.extremehacking.org
CEHv8 CHFIv8 ECSAv8 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE,Certified Ethical Hacking, Center For Advanced Security Training in India,IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune

By |August 17th, 2015|Papers|

Android secret codes…

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

 

www.extremehacking.org
CEHv8 CHFIv8 ECSAv8 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE,Certified Ethical Hacking, Center For Advanced Security Training in India,IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune

By |August 17th, 2015|Papers|

Taking windows 7 down with a simple shortcut file!

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

In this tutorial, I will show you how to use a simple shortcut file to crack a windows 7 computer.

Cracking into a computer can be useful for a number of reasons: it can give you access to the rest of the network, you can use it as a proxy to […]

By |August 16th, 2015|Papers|

XSS ATTACKS in detail…

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Cross-site scripting attacks (CSS-XSS)

Note 1: This tut requires only basic knowledge of HTML, javascript and
php.

Note 2: Of course which language you will use to exploit the
vulnerability
on your “thief” site is your choice… I use php…

1.Introduction
2.Finding vulnerabilities
3.Exploiting vulnerabilities
4.Protecting your site

—-1.Introduction—-

CSS attacks are the easiest attacks one can use to attack a […]

By |August 16th, 2015|Papers|

MySQL Injection in Detail..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

 

INTRO!!
In this tutorial, I will demonstrate the infamous MySQL injection in newbie perspective so that all the newbies become able to become successful SQL injector. But, be sure to check various php & mysql functions in various sites which will help you a lot…  Now lets begin our walkthrough of […]

By |August 16th, 2015|Papers|

View saved passwords on any website

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Ok, so i’m going to be showing you a very simple and probably well known method for viewing password fields on websites. Before you go ahead and say this is a stupid method, it can help with you trying to find out your brothers or sisters password, or even a […]

By |August 15th, 2015|Papers|

Installing metasploit framework on Ubuntu

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

This Guide covers the installation of Metasploit Framework OSS Project on Ubuntun Linux LTS. If you do not wish to run the Open Source version or set up a development environment and do not mind giving your email address to Rapid 7 for marketing I would recommend downloading their comercial […]

By |August 15th, 2015|Papers|

Jabber setup for Secure chat

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Secure chat:
I would recommend you to use jabber and not do stupid mistakes by using skype and other insecure chat systems. Skype might be a good idea for family and friends connecting together but I think a forum like this needs to advance up a bit and move away from […]

By |August 14th, 2015|Papers|

creating your own Email Spoofer

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

 

Hello I have come across alot of posts wanting an email spoofer so i thought id share this and hopefully its noob friendly.

In order to fake (spoof) an email, you first need to have an SMTP (Simple Mail Transfer Protocol) server that you can use to send the email from. […]

By |August 14th, 2015|Papers|

Decrypting whatsapp crypt file without Key | Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Advanced Ethical Hacking Institute in Pune

 

Its about hacking WhatsApp verification p1rocess and decrypting .crypt7,8 files.
So basically if You have a .crypt7 file, and you need to decrypt it. there is a way to decrypt without KEY .

First You have to Register Whatsapp by […]

By |August 14th, 2015|Papers|