Papers

/Papers

Spoofing MAC Address using Kali

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

MAC address spoofing is a technique for changing your Media Access Control (MAC) address on a network device. A MAC Address is a unique and hardcoded address in network devices which cannot be changed. Macchanger is a tool included with Kali Linux and can change the MAC address to any desired address until […]

By |July 29th, 2015|Papers|

Wifi Hacking Tools

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In Wifi Hacking Tools we will be talking about a very popular subject: hacking wireless networks and how to prevent it from being hacked. Wifi is often a vulnerable side of the network when it comes to hacking since signals can be picked up everywhere and by anyone. Router manufacturers and ISPs […]

By |July 26th, 2015|Papers|

Hack Team Exploit Demo, How they used to Hack..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be importing the CVE-2015-5122 (Adobe Flash opaqueBackground Use After Free) zero day Flash Exploit module in Metasploit and have a vulnerable setup download the malicious Flash file. Recent versions of Adobe Flash Player contain critical vulnerabilities within the ActionScript 3 ByteArray, opaqueBackground and BitmapData classes. Exploiting […]

By |July 26th, 2015|Papers|

Packet Fingerprinting with Wireshark and Detecting NMap Scans

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This is going to be a fairly long tutorial on Wireshark. This is if you have had some sort of experience with wireshark and nmap, and you should have an above-average understanding of some basic protocols.

We will be covering some major scans including:
TCP Scans (Transmission Control Protocol)
~ TCP SYN scan […]

By |July 22nd, 2015|Papers|

How to crack accounts with Sentry

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

I’ve been getting a lot of questions on how to crack accounts via SentryMBA so I have decided to take some of my time and make a tutorial for the beginners!

Things you will need:

SentryMBA — http://www.sendspace.com/file/l0r5lh
PoizonProxyProcessor_v1.0 — http://www.sendspace.com/file/1x312z
AIOHNB — http://www.sendspace.com/file/i1q1bi
Sentry Configs — http://www.sendspace.com/file/94ht2k
Combo2Email — http://www.sendspace.com/file/7901ra
________________________________________________________________

Step #1.
– Download SentryMBA

– Once you […]

By |July 22nd, 2015|Papers|

Password Sniffing using Wireshark

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Wireshark Password Sniffing

Tools:
• Alpha wireless card
• Kali Linux
• Ettercap (Man in Middle tool)
• Sslstrip(Turns HTTPS into HTTP so we can see passwords in clear text)
• Wireshark (Packet sniffer)

First login to your Kali Machine. After logging in we need to forward port 80 to port 10000 which is what sslstrip will […]

By |July 21st, 2015|Papers|

Writing Custom ASCII Shellcode

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Hello everyone!

This is going to be a very difficult tutorial so this may require that you have some knowledge in shellcode writing and basic assembly.
First, we will construct a loader that will make room on the stack, copy our payload, and execute it all on the stack at runtime.

This is […]

By |July 21st, 2015|Papers|

Admin page finder, DIRBUSTER

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Hi

I would like to tell you about an awesome tool that comes with Kali Linux. DIRBUSTER

This tool is a crawler that can find directories and files hidden by website admins trough brute-force.
Can find admin pages, hidden pages, hidden directories, etc.

So i made a small and simple tutorial about it. […]

By |July 21st, 2015|Papers|

Best ways to hide any file/text/video inside an image

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Howdy Guys? From such a long time i am presenting you a short and simple trick to hide any kind of file like txt, mp3, exe, avi or any extension using Steganography technique (hiding file into image is called steganography, and it allows you to hide text in images without […]

By |July 21st, 2015|Papers|

Cracking WinRar with OllyDBG/x64dbg

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Hey guys,

Today I’ll be showing you how to crack WinRAR. I was storing some files on my webserver and my WinRAR license was past its due date (like a really long time) and the nag screen annoyed me as fuck. That’s why I decided to reverse engineer it and write […]

By |July 19th, 2015|Papers|