Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

Santoku: Mobile Forensics, Malware Analysis And App Security Testing

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Santoku is an open-source platform that is also very simple to use as well as it dedicated to mobile forensics, analysis, and security.
The word Santoku means that “three virtues” or “three uses.” Santoku  Linux has been designed to you in these three achievements that are […]

By |November 17th, 2016|Papers|

Paros: A Java – Based Web Proxy Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Paros is a Java based HTTP/HTTPS proxy for assessing the vulnerability of web application. And it supports the editing/viewing HTTP/HTTPS messages on-the-fly to modify the items just like cookies as well as form fields.

Whereas it includes many other features such as traffic recorder, web spider, […]

By |November 17th, 2016|Papers|

Malzilla: An Advanced Malware-Hunting Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Malzilla: An Advanced Malware-Hunting Tool
Malzilla is an advanced malware-hunting tool which is specialized for hunting web-based exploits, interpret obfuscated JavaScripts etc.
It can discover the HTML text, hex code, cookies as well as parsed links of web pages to consider any malicious activity by using this […]

By |November 17th, 2016|Papers|

TomCatWarDeployer: Apache Tomcat Auto WAR Deployment And Pwning Penetration Testing Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

TomCatWarDeployer: Apache Tomcat Auto WAR deployment & Pwning Penetration Testing Tool..
Apache Tomcat auto WAR deployment & pwning penetration testing tool.
What is it?

This is a penetration testing tool intended to leverage Apache Tomcat credentials in order to automatically generate and deploy JSP Backdoor, as well as […]

By |November 15th, 2016|Papers|

DMitry A Deepmagic Information Gathering Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU) Linux Command Line Application coded in C language.

DMitry has the ability to gather as much information as possible about a host. Base functionality is able to gather possible subdomains, email addresses, uptime information, tcp port scan, whois […]

By |November 15th, 2016|Papers|

Pharming: A Type of Phishing And DNS Poisoning Attack

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Pharming: A Type of Phishing And DNS Poisoning Attack
Pharming is a cyber attack intended to redirect a website’s traffic to another, fake site. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS […]

By |November 15th, 2016|Papers|

How To Break SSL Protection via MITM Attack With SSLStrip Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

How To Break SSL Protection via MITM Attack With SSLStrip Tool
sslstrip is a MITM tool that implements Moxie Marlinspike’s SSL stripping attacks. It requires Python 2.5 or newer, along with the ‘twisted’ python module.
First Requirements:

Run Python
The python “twisted-web” module (apt-get install python-twisted-web)

Setup

 Unpack: […]

By |November 15th, 2016|Papers|

A2SV: Auto Scanning Tool To Find SSL Vulnerability

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A2SV: Auto Scanning Tool To Find SSL Vulnerability
What is A2SV?
Its an Auto Scanning tool to find SSL Vulnerability and its featured with HeartBleed, CCS Injection, SSLv3 POODLE, FREAK… etc

A. Support Vulnerability

CCS Injection
HeartBleed
SSLv3 POODLE
FREAK Attack
LOGJAM Attack
SSLv2 DROWN

B. Dev Plan

SSL […]

By |November 15th, 2016|Papers|

CuckooDroid – Automated Android Malware Analysis Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

CuckooDroid – Automated Android Malware Analysis with Cuckoo Sandbox.
CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files, CuckooDroid brigs to cuckoo the capabilities of execution and analysis of android application.

CuckooDroid featured with VM-detection techniques, encryption key extraction, […]

By |November 15th, 2016|Papers|

Pompem – Exploit and Vulnerability Finder Pentester Tool

Ethical Hacking Training Institute
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Pompem – Exploit and Vulnerability Finder Pentester Tool
Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases.
Its’s Developed in Python, has a system of advanced search, that help the work of pentesters and ethical hackers. […]

By |November 15th, 2016|Papers|