Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

These are the top NoSQL DBMS

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

A database which stores data in form of key-value pair is called a relational database. Alright! let me explain myself.

a relational database stores data as tables with numerous rows and columns.(I think this one is easy to understand).

A key is a column (or […]

By |April 28th, 2016|Papers|

New Windows Ransomware Steals Password Before Encrypting It. : ECCOUNCIL PRESENTATION

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Hello every one, this post contains Weekly Presentation from Ec-Council.

Topic from the Presentation: New Windows Ransomware Steals Password Before Encrypting It. 

A paper detailing a new attack vector on TLS was released on December 30. The attack, known as the HTTPS Bicycle Attack, is able to determine the […]

By |April 22nd, 2016|Papers|

Bypassing Antivirus using Veil on Kali Linux

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Veil is an awesome tool developed by Chris Truncer @ChrisTruncer, Mike Wright @TheMightyShiv and The Grayhound @the_grayhound specifically designed for Kali Linux

Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on […]

By |April 17th, 2016|Papers|

How to sniff password using Wireshark

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Credits: moufid

Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions.
This tutorial can be an angel and also devil in […]

By |April 5th, 2016|Papers|

Spoofing MAC Address on Android

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

A Media Access Control address […]

By |April 2nd, 2016|Papers|

Top 10 Android ROMs for customizing your Android device

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Tired of Stock Android firmware then check these 10 Best Custom Android ROMs and try out one of them

What is the meaning of Custom Android ROM : It includes anything from  making changes to the custom codes in such a way so that the Android device starts […]

By |March 19th, 2016|Papers|

DROWN VULNERABILITY IS STILL AT HIGH RISK – RESEARCH SAYS

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Patching the systems at risk due to massive transport layer security (TLS) vulnerability  which is known as DROWN is still having hard time providing complete protection. Two research firms , Netskope and Skyhigh Networks, says that a week after the vulnerability was identified DROWN still presents a high risk […]

By |March 14th, 2016|Papers|

opening for Security Consultant

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Job Responsibility
Consultant will be responsible technical security assessment including source code review, vulnerability assessment and penetration testing of application, network, and mobile application as well as security research is required for all organization.

The consultant ensure that networks, applications and products are secure from the all type […]

By |March 11th, 2016|job|

Create simple Config – Sentry MBA

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

First open up Sentry MBA(if you have AIO version, do a full reset first)

Take the login url and paste it under Sitie: in sentry mba like this:

Then move over to “HTTP Headers” under General:

Set the Request Method to “MW”(Magic Wand):

Now press the orangeish Magic Wand:

Press “Analyze […]

By |March 9th, 2016|Papers|

Android smartphone and iPhone can be hacked using side channel attack

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Researchers use Side-Channel attack to steals Encryption keys from Android and iOS Devices
Side-channel attack has been used earlier to hack into air gapped computers but this is the first time researchers have used this vector to steal encryption keys from Android smartphones and iOS devices. Five researchers […]

By |March 5th, 2016|Papers|