Papers

/Papers

Creating a 100% FUD crypter

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 
What is a Crypter?
Okay before we get into the good stuff, lets first clear up all your questions you have been having by really getting into all the fundamentals of Crypters. Oh and if you have any questions of anything throughout this tutorial, always refer and search on Hackforums for […]

By |August 13th, 2015|Papers|

Kicking someone out from wireless network..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

 

Today im going to be showing you how to deauth a wifi network Now before we start we need to understand what a deauth attack is. So a deauth attack is an attack that sends a packet to the BSSID, that kicks all people off that network. Whats the […]

By |August 13th, 2015|Papers|

How To Forward Ports on Your Router

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Port Forwarding

From Inside of Your Network

Here’s a map of a simple home network.

As you can see, you’ve got three computers with unique IP addresses all connected to a router. You can easily access the other computers, but when they all access the internet, they go through the router. The router […]

By |August 4th, 2015|Papers|

United Airlines Hacked by Sophisticated Hacking Group

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

A group of China-backed hackers believed to be responsible for high-profile data breaches, including the U.S. Office of Personnel Management and the insurance giant Anthem, has now hit another high-profile target – United Airlines.

United detected a cyber attack into its computer systems in May or early June; Bloomberg reported, citing some […]

By |July 30th, 2015|Cyber News, Papers|

Cracking WPA with oclHashcat GPU on Windows

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This tutorial shows you how to crack the WPA/WPA2 wireless network key using oclHashcat on Windows with the power of GPU’s. My older Radeon 7670M video card does an average of 20kh (20.000 attempts) per second where a AMD HD7970 videocard can do 142kh (142.000 attempts) per second and 8 x NVidea Titan X […]

By |July 29th, 2015|Papers|

How to hack UPC wireless networks and other WLAN

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorials we will show you how to hack UPC wireless networks with the default password which is a common thing for many UPC customers. The first step is to create a password list which contains all possible combinations of 8 capital letters. We will be using Maskprocessor in Kali Linux to […]

By |July 29th, 2015|Papers|

Finding WPS enabled Wifi Networks

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Kali Linux Wash is a tool to find WPS enabled routers in your area. A lot of routers support Wifi Protected Setup (WPS) and it’s likely enabled by default by your internet service provider or by the router manufacturer. Like UPnP, it is an insecure feature that makes your wireless network more […]

By |July 29th, 2015|Papers|

Pixie Dust Attack WPS in Kali Linux with Reaver

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we are going to do a pixie dust attack using Reaver, Aircrack-NG and Pixiewps. Pixie Dust attack is an offline attack which exploits a WPS vulnerability. The tool, Pixiewps, is written in C and works with a modified version of Reaver. When a wireless router is vulnerable […]

By |July 29th, 2015|Papers|

How to hack Wireless Router

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will show you how to hack a TP link WR841N router wireless network with the default wifi password using Kali Linux. Wireless routers use the default WPS PIN as wifi password out of the box. We will try the following techniques to hack a TP link router […]

By |July 29th, 2015|Papers|

Open Port Scanning and OS Detection with Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we are going to use Nmap in Kali Linux to scan for open ports scan and we will be using OS detection. Nmap stands for Network Mapper and is an open source tool for network exploration and security auditing which comes standard with Kali Linux but is also available for Windows, […]

By |July 29th, 2015|Papers|