Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

OFFICE 2013 EXPLOIT CREATION – ExtremeHacking

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Description / About

Creating a document that will download your executable application and executing it isn’t as difficult as you think it is. If you follow this tutorial and use the resources given to you, I have the highest hope that by the end you’ll have a […]

By |December 13th, 2015|Papers|

How To Access Unsecured Security Cameras Around The World

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Watch Security Cameras:

All that we are looking at is a bunch of unsecured cams from around the world that are interfaced with the internet. So how do you find such cameras? Just google any of these following strings and select any result.

Whoa, you can see a live cam on […]

By |December 13th, 2015|Papers|

Hacker-Friendly Search Engine that Lists Every Internet-Connected Device

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Meet an all-new Hacker’s Search Engine similar to Shodan – Censys.

At the end of last month, security researchers from SEC Consult found that the lazy manufacturers of home routers and Internet of Things (IoT) devices have been re-using the same set of hard-coded cryptographic keys, leaving […]

By |December 11th, 2015|Papers|

Hacking Gmail account using GX cookie

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

Introduction

Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attempt. The method which I will describe in this post is not new; the same method can be applied to yahoo and other free web email […]

By |December 10th, 2015|Papers|

Using XSS for bypassing CSRF protection

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

Well, now we go to the important part, how to use XSS to bypass CSRF protection. This technique applies to those websites, who have an application guarded by CSRF, and another page which is vulnerable to XSS. Using that XSS we can bypass the CSRF protection […]

By |December 10th, 2015|Papers|

These Top 10 Programming Languages Have Most Vulnerable Apps on the Internet

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

A new research showed that Scripting languages, in general, give birth to more security vulnerabilities in web applications, which raised concerns over potential security bugs in millions of websites.

The app security firm Veracode has released its State of Software Security: Focus on Application Development report (PDF), […]

By |December 5th, 2015|Papers|

A Step-by-Step Guide — How to Install Free SSL Certificate On Your Website

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

Another Big Milestone – Let’s Encrypt is now offering Free HTTPS certificates to everyone.

Let’s Encrypt has opened to the public, allowing anyone to obtain Free SSL/TLS (Secure Socket Layer/Transport Layer Security) certificates for their web servers and to set up HTTPS websites in a few simple […]

By |December 4th, 2015|Papers|

Bypass MAC filtering on wireless networks

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

In this tutorial we will be looking at how to bypass MAC filtering on a wireless network. MAC filtering is often used as a security measure to prevent non whitelisted MAC addresses from connecting to the wireless network. With MAC filtering you can specify MAC addresses […]

By |November 29th, 2015|Papers|

Malware Types Explained

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

In this article we will be looking at the different kinds of malware and what they do. When performing static or dynamic malware analysis it is crucial to have a good understanding of the different malware types available so you are able to recognize them and focus […]

By |November 29th, 2015|Papers|

Dynamic Malware Analysis Tools

Extreme Hacking | Sadik Shaikh
Ethical Hacking Institute Course in Pune-India

In this tutorial we will be covering Dynamic Malware Analysis Tools which are used to analyse activity after the execution of malware in virtual machines. We will be looking at tools like Procmon, Process Explorer, Regshot, ApateDNS, Netcat, Wireshark and INetSim to analyse the malware. Dynamic Malware Analysis is typically performed after static malware […]

By |November 29th, 2015|Papers|