Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

Installing metasploit framework on Ubuntu

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

This Guide covers the installation of Metasploit Framework OSS Project on Ubuntun Linux LTS. If you do not wish to run the Open Source version or set up a development environment and do not mind giving your email address to Rapid 7 for marketing I would recommend downloading their comercial […]

By |August 15th, 2015|Papers|

Jabber setup for Secure chat

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

Secure chat:
I would recommend you to use jabber and not do stupid mistakes by using skype and other insecure chat systems. Skype might be a good idea for family and friends connecting together but I think a forum like this needs to advance up a bit and move away from […]

By |August 14th, 2015|Papers|

creating your own Email Spoofer

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

 

Hello I have come across alot of posts wanting an email spoofer so i thought id share this and hopefully its noob friendly.

In order to fake (spoof) an email, you first need to have an SMTP (Simple Mail Transfer Protocol) server that you can use to send the email from. […]

By |August 14th, 2015|Papers|

Decrypting whatsapp crypt file without Key | Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Advanced Ethical Hacking Institute in Pune

 

Its about hacking WhatsApp verification p1rocess and decrypting .crypt7,8 files.
So basically if You have a .crypt7 file, and you need to decrypt it. there is a way to decrypt without KEY .

First You have to Register Whatsapp by […]

By |August 14th, 2015|Papers|

Creating a 100% FUD crypter

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 
What is a Crypter?
Okay before we get into the good stuff, lets first clear up all your questions you have been having by really getting into all the fundamentals of Crypters. Oh and if you have any questions of anything throughout this tutorial, always refer and search on Hackforums for […]

By |August 13th, 2015|Papers|

Kicking someone out from wireless network..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

 

 

Today im going to be showing you how to deauth a wifi network Now before we start we need to understand what a deauth attack is. So a deauth attack is an attack that sends a packet to the BSSID, that kicks all people off that network. Whats the […]

By |August 13th, 2015|Papers|

How To Forward Ports on Your Router

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Port Forwarding

From Inside of Your Network

Here’s a map of a simple home network.

As you can see, you’ve got three computers with unique IP addresses all connected to a router. You can easily access the other computers, but when they all access the internet, they go through the router. The router […]

By |August 4th, 2015|Papers|

United Airlines Hacked by Sophisticated Hacking Group

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

A group of China-backed hackers believed to be responsible for high-profile data breaches, including the U.S. Office of Personnel Management and the insurance giant Anthem, has now hit another high-profile target – United Airlines.

United detected a cyber attack into its computer systems in May or early June; Bloomberg reported, citing some […]

By |July 30th, 2015|Cyber News, Papers|

Cracking WPA with oclHashcat GPU on Windows

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This tutorial shows you how to crack the WPA/WPA2 wireless network key using oclHashcat on Windows with the power of GPU’s. My older Radeon 7670M video card does an average of 20kh (20.000 attempts) per second where a AMD HD7970 videocard can do 142kh (142.000 attempts) per second and 8 x NVidea Titan X […]

By |July 29th, 2015|Papers|

How to hack UPC wireless networks and other WLAN

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorials we will show you how to hack UPC wireless networks with the default password which is a common thing for many UPC customers. The first step is to create a password list which contains all possible combinations of 8 capital letters. We will be using Maskprocessor in Kali Linux to […]

By |July 29th, 2015|Papers|