Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

Transport Layer Of OSI Model: Working Functionalities and Protocols (A Beginner’s Guide)

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

As we talked earlier in the article OSI Model its 7 layers, the transport layer is responsible for the most of the functionalities out of all the OSI layers. So, let’s go further and take a look into what all basic things transport layer […]

By |July 14th, 2016|Papers|

Secure Your Computer By Blocking Dangerous IP Automatically

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Basically, spying and other critical bots are always online to find out the vulnerability in your computer, there are million of IP’s on the internet that pretends to be safe but in the actual term, they are very dangerous which may steal your […]

By |July 13th, 2016|Papers|

What is Address Resolution Protocol (ARP) and How does it Work ?

Ethical Hacking Training Institute in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Address Resolution Protocol (ARP) is a protocol used for mapping an IP address to a physical machine address that is present in the local network, especially for IP Version 4 which has a 32 bits long address. However, in an Ethernet local area network, physical […]

By |July 3rd, 2016|Papers|

Why Should We Remove USB Device Safely ?

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

One day i was working in my friends PC, and when i was about to remove the USB device he shouted Wait ! let me remove USB device safely , He said. I was wondering since then, should we remove USB device safely […]

By |July 3rd, 2016|Papers|

How to get started with Ethical Hacking. 6 Great E-books on ethical hacking

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

If you an aspiring hacker who wants to get as much info on hacking, apart from online tutorials online free ebooks are a very good choice.If you are ready to read about ethical hacking but don’ know what to read here we bring you […]

By |July 3rd, 2016|Papers|

Lizard Squad uses botnets from hijacked CCTV Cameras to attack bank websites

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Lizard Squad turn CCTV Cameras into massive botnets to launch massive DDoS attacks
Hackers are turning the huge network of CCTV cameras installed worldwide into DDoS botnets which conduct DDoS attacks on banks, gaming firms and government agencies. The CCTV camera botnet uses a open […]

By |July 3rd, 2016|Papers|

How To Enable Ctrl+C / Ctrl+V For Copy-Pasting In Windows Command Prompt

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Some of the most intriguing Command prompt-related queries that I have seen people looking out for are:

How to enable copy and paste in CMD?
Copy and paste not working in CMD
How to copy and paste in command prompt?
Ctrl+C/ Ctrl+V not working in CMD

Well, here is […]

By |July 1st, 2016|Papers|

Here is Why You Should be Very careful While Using Public Wi-Fi

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

We are all told constantly that we should be very careful about connecting to free public Wi-Fi. Though it is an easy warning to forget about when we are away from the home or when we need to get online urgently.

In an experiment conducted […]

By |July 1st, 2016|Google Hacking Database, Papers|

Spreading malware through Images with Stegosploit tool

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Next gen cyber attacks could be through Internet images using Stegosploit tool which allows hackers to embed malware in an image
Security Researcher Saumil Shah has developed a Stegosploit tool wherein hackers can embed executable JavaScript code within an image to trigger a drive by […]

By |July 1st, 2016|Papers|

How To Create Bootable USB Without Any Software In Windows 10 (Using Command Prompt)

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

These days very few people burn ISO images on disks and use them as bootable media. Now, USB drives have replaced them as they are faster and a more convenient method to install an operating system on a machine.

While there are many tools […]

By |June 29th, 2016|Papers|