Papers

/Papers

Congestion Control In Frame Relay — Basic Working Mechanisms

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

 

Frame Relay manages the congestion control very wisely on the network. .

First, to reduce the congestion control, Frame relay only uses a single bit in its header. Furthermore, it uses notification system for congestion not exclusively for the per virtual circuit connection flow control — […]

By |August 16th, 2016|Papers|

Network Image Hack.

Ethical Hacking Institute in India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

So there might be a better way of doing this on windows but while I work on my project, this is the best you will get out of me.

You will need

Cain and abel http://www.oxid.it/cain.html
Wireshark https://www.wireshark.org/download.html

To start what you need to do is open Cain […]

By |July 31st, 2016|Hacking, Papers|

(MySQL injection–Cross Site Scripting–File inclusion) Practical Approach Guide

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Table of Contents

Introduction
 
MySQL injection▸ How does MySQL injection work?
▸ How do our malicious queries get executed?

Cross Site Scripting▸ How does Cross Site Scripting work?
▸ How do our malicious vectors get executed?

File inclusion▸ How does Local & Remote File Inclusion work?
▸ How do we […]

By |July 27th, 2016|Papers|

SQL Injection to shell for beginners

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: Mike

Hello Everyone,

Today, we will see how to upload a shell through SQL injection (+No needed an Admin Panel),

Requirements:

Vulnerable site.
Shell in txt format [Example: http://.com/shell.txt].
Your Brain (;

~~~
Firstly, we need to use order by statement to count the number of columns.
http://.com/index.php?id=1+order+by+1–
http://.com/index.php?id=1+order+by+2–
http://.com/index.php?id=1+order+by+3–
http://.com/index.php?id=1+order+by+4–
We […]

By |July 27th, 2016|Papers|

Bypass Windows Admin LogIn with a USB

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

I’m going to be showing you a way to bypass a administrator login on a Windows computer.

All that you will need is a USB and Kon-Boot, which can be easily found online.

Step 1: Download the zip folder containing Kon-Boot and extract it to […]

By |July 26th, 2016|Papers|

HACK ANY IOS DEVICE

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: Brother Plethora

Hey guys! Today I will be sharing a unique method of monitoring and controlling any IOS device remotely from your PC or pretty much any device that can run a browser.

Supplies needed:

– Target device running any IOS version above 5.0
– Computer
– 5 minutes […]

By |July 26th, 2016|Papers|

19 Best Hidden iPhone Secret Codes In 2016

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

About 25 percent of iPhone users are hardcore, they really dig out more and more information relating to their iPhone and they do experiments with their iPhone as well, but average iPhone users really don’t care or don’t want to do experiments with […]

By |July 24th, 2016|Papers|

Here is How To Install Chrome On Kali Linux Without Errors

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

If you are someone who wants to use Kali Linux as your main operating system, the most common issue you face initially in lacking of a good browser. The default browser in Kali Linux is iceweasel which is a forked version of Firefox. […]

By |July 24th, 2016|Papers|

A Beginner’s Guide To Frame Relay In Computer Networks

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Frame Relay is a WAN protocol that operates at the physical layer and data link layer of the OSI reference model. The main purpose of designing the Frame Relay was to use this technology across Integrated Services Digital Network (ISDN) interfaces. However, with […]

By |July 23rd, 2016|Papers|

All The Top Android dialler commands to bring special menus

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Top Android Secret Dialler Codes You Should Know
You may be an Android expert but there are some handy tricks you dont know about Android smartphone which could help you troubleshoot ticklish problems like Camera or GPS now working.

This happened to me when my […]

By |July 15th, 2016|Papers|