Papers

/Papers

Scanning a network for live hosts with Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we are going to use Nmap in Kali Linux to scan the network for live hosts. You can use the command ifconfig to determine which IP range you will be scanning for live hosts. We will be using a ping scan on a range of possible live hosts […]

By |July 29th, 2015|Papers|

How to enumerate webserver directories with Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be using Nmap on Kali Linux to enumerate webserver directories from popular web applications. We will be using the Nmap plugin http-enum.nse for this purpose. The first step in web application penetration testing is scanning webserver directories for popular web applications. Many applications have known […]

By |July 29th, 2015|Papers|

Heartbleed SSL bug Scanning using Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This tutorial shows you how to scan a target for the well known Heartbleed SSL Bug using Nmap on Kali Linux. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library and was introduced in 31 December on 2011 and released in March 2012. This weakness […]

By |July 29th, 2015|Papers|

Scanning for SMB vulnerabilities using Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be using a Nmap script to scan for SMB vulnerabilities. The Nmap Scripting Engine (NSE) is on of Nmap’s most powerful and flexible features. The frontpage on Samba.org describes Samba as:
Since 1992, Samba has provided secure, stable and fast file and print services for all clients using the SMB/CIFS protocol, […]

By |July 29th, 2015|Papers|

Crunch a Password list generator

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be using the Crunch Password list generation tool in Kali Linux. Crunch is an easy to use tool for generating a custom made password list used for brute force password cracking. Crunch comes as a standard tool in Kali Linux. This tutorial shows you how easy it is to generate a password […]

By |July 29th, 2015|Papers|

Scanning Webservers with Nikto for vulnerabilities

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This tutorial shows you how to scan webservers for vulnerabilities using Nikto in Kali Linux. Nikto is a webserver assessment tool to find potential problems and vulnerabilities very quickly. Nikto comes standard as a tool with Kali Linux and should be your first choice when pen testing webservers and web applications. Nikto […]

By |July 29th, 2015|Papers|

Ransomware infection and removal guide

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Tox Ransomware is malware which encrypts your hard drive and demands money in exchange for decryption. After CTB-Locker, Teslacrypt, CryptoWall, Cryptolocker and TorrentLocker, Tox is the new ransomware on the block. Tox is set up as a Ransomware-as-a-service where Tox developers take 20% of the paid ransoms. Tox (or toxicola ransomware) is only accessible over the TOR […]

By |July 29th, 2015|Papers|

Scanning Directories using Websploit

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In the next few tutorials I will explain how to use the different Websploit modules. WebSploit is an open source project for web application assessments. In this tutorial we will be using the websploit directory scanner module and we will add some custom directories. Websploit directory scanner is a script which […]

By |July 29th, 2015|Papers|

Installing VPN on Attacking Machine

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

VPN on Kali Linux is strangely not installed and enabled by default which leaves you with a greyed out VPN option panel. VPN stands for Virtual Private Network and extends your private network over the internet. In this tutorial we will install the necessary packages and setup the popular VyprVPN service in Kali […]

By |July 29th, 2015|Papers|

Cloudflare IP resolving using websploit.

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be testing and using the Cloudflare resolver module in Websploit on Kali Linux. Cloudflare is a company that provides a content delivery network and distributed DNS (Domain Name Server) services, sitting between the visitor and the hosting provider of the Cloudflare user. This way Cloudflare is acting […]

By |July 29th, 2015|Papers|