Papers

/Papers

Cracking RC4 Encryption in WPA-TKIP and TLS

Extreme Hacking

Advanced Ethical Hacking Institute in Pune
Security researchers have developed a more practical and feasible attack technique against the RC4 cryptographic algorithm that is still widely used to encrypt communications on the Internet.

Despite being very old, RC4 (Rivest Cipher 4) is still the most widely used cryptographic cipher implemented in many popular protocols, including:

SSL (Secure Socket […]

By |July 18th, 2015|Papers|

Malicious Gaming App Infects More than 1 Million Android Users

Advanced Ethical Hacking Institute in Pune

It’s not at all surprising that the Google Play Store is surrounded by a number of malicious applications that may gain users’ attention to fall victim for one, but this time it might be even worse than you thought.

Threat researchers from security firm ESET have discovered a malicious Facebook-Credentials-Stealing Trojan masquerading […]

By |July 13th, 2015|Papers|

Bitcoin Cloud Mining Service Hacked; Database On Sale for Just 1 Bitcoin

Advanced Ethical Hacking Institute in Pune

Bitcoin Cloud Mining service Cloudminr.io has been hacked and its whole users database is on sale for 1 Bitcoin.

The unknown hackers have successfully taken full control of the website’s server and defaced the homepage of the website.

 

Users visiting the website are greeted with a defaced homepage showing the partial database of […]

By |July 13th, 2015|Papers|

SIMPLE way to see the password behind asterisks – N00b Style

Advanced Ethical Hacking Institute in Pune

All you need to do is highlight and right click the password field of the target page, and click “Inspect Element”.

For something like Facebook, here’s how it would look:

 

Code:
<input type=”password” class=”inputtext” name=”pass” id=”pass” tabindex=”2″>

Now change the type=”password” to type=”text”

And there you have it!

www.extremehacking.org
CEHv8 CHFIv8 ECSAv8 CAST ENSA CCNA CCNA SECURITY MCITP […]

By |July 13th, 2015|Papers|

Infecting People on LAN/WAN without sending any files!

Advanced Ethical Hacking Institute in Pune

My favourite program by far is SET (which stands for social engineering toolkit). It’s super easy to use, and gives magnificent results.

There are multiple methods of using SET. The one I will explain to you is my favourite. Basically it will copy a website and make it so that when anyone […]

By |July 13th, 2015|Papers|

WinRAR Extension Spoof

Advanced Ethical Hacking Institute in Pune

Hey guys,
Today I am going to briefly show you a neat little exploit that is available in WinRAR, version 4.20. You may or may not of heard of it, but it involves editing WinRAR’s ‘second’ filename.

Prerequisites:
– WinRAR 4.20
– A hex editor.
– A file to spoof.

Method:
– Okay, so first things first you […]

By |July 9th, 2015|Papers|

DDos A Website Using Hping3

Advanced Ethical Hacking Institute in Pune

Hping:-

hping is a command-line oriented TCP/IP packet assembler/analyzer.It supports TCP, UDP, ICMP and RAW-IP protocols.But it can be used as a powerful ddos tool.
By using hping you can do:
Quote:Firewall testing
Advanced port scanning
Network testing, using different protocols, TOS, fragmentation
Manual path MTU discovery
Advanced traceroute, under all the supported protocols
Remote OS fingerprinting
Remote uptime guessing
TCP/IP […]

By |July 9th, 2015|Papers|

POC – How Facebook Account gets Hijacked

Advanced Ethical Hacking Institute in Pune

Step 1 – Grab the user’s email address:
This can be simply done through creating a Yahoo email account and importing contacts from your original Facebook account. To do this, simply create a Yahoo account, login to it, click the large “IMPORT CONTACTS” button and select Facebook.

Step 2 – Finding the user’s […]

By |July 7th, 2015|Papers|

MITM attack on Windows Server 2012 R2

Advanced Ethical Hacking Institute in Pune

As discussed in CEH class when it comes to network attacks, we are constantly looking for the most recent and up-to-date attack vectors in modern network environments. With this tutorial, I’d like to go over the steps needed to become MITM of new network devices in networks with the most up-to-date […]

By |July 7th, 2015|Papers|

Office 2013 EXPLOIT CREATION

Advanced Ethical Hacking Institute in Pune

Creating a document that will download your executable application and executing it isn’t as difficult as you think it is. If you follow this tutorial and use the resources given to you, I have the highest hope that by the end you’ll have a document that will do just that.

Necessary Resources

Please […]

By |July 6th, 2015|Papers|