Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

Finding WPS enabled Wifi Networks

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Kali Linux Wash is a tool to find WPS enabled routers in your area. A lot of routers support Wifi Protected Setup (WPS) and it’s likely enabled by default by your internet service provider or by the router manufacturer. Like UPnP, it is an insecure feature that makes your wireless network more […]

By |July 29th, 2015|Papers|

Pixie Dust Attack WPS in Kali Linux with Reaver

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we are going to do a pixie dust attack using Reaver, Aircrack-NG and Pixiewps. Pixie Dust attack is an offline attack which exploits a WPS vulnerability. The tool, Pixiewps, is written in C and works with a modified version of Reaver. When a wireless router is vulnerable […]

By |July 29th, 2015|Papers|

How to hack Wireless Router

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will show you how to hack a TP link WR841N router wireless network with the default wifi password using Kali Linux. Wireless routers use the default WPS PIN as wifi password out of the box. We will try the following techniques to hack a TP link router […]

By |July 29th, 2015|Papers|

Open Port Scanning and OS Detection with Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we are going to use Nmap in Kali Linux to scan for open ports scan and we will be using OS detection. Nmap stands for Network Mapper and is an open source tool for network exploration and security auditing which comes standard with Kali Linux but is also available for Windows, […]

By |July 29th, 2015|Papers|

Scanning a network for live hosts with Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we are going to use Nmap in Kali Linux to scan the network for live hosts. You can use the command ifconfig to determine which IP range you will be scanning for live hosts. We will be using a ping scan on a range of possible live hosts […]

By |July 29th, 2015|Papers|

How to enumerate webserver directories with Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be using Nmap on Kali Linux to enumerate webserver directories from popular web applications. We will be using the Nmap plugin http-enum.nse for this purpose. The first step in web application penetration testing is scanning webserver directories for popular web applications. Many applications have known […]

By |July 29th, 2015|Papers|

Heartbleed SSL bug Scanning using Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This tutorial shows you how to scan a target for the well known Heartbleed SSL Bug using Nmap on Kali Linux. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library and was introduced in 31 December on 2011 and released in March 2012. This weakness […]

By |July 29th, 2015|Papers|

Scanning for SMB vulnerabilities using Nmap

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be using a Nmap script to scan for SMB vulnerabilities. The Nmap Scripting Engine (NSE) is on of Nmap’s most powerful and flexible features. The frontpage on Samba.org describes Samba as:
Since 1992, Samba has provided secure, stable and fast file and print services for all clients using the SMB/CIFS protocol, […]

By |July 29th, 2015|Papers|

Crunch a Password list generator

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be using the Crunch Password list generation tool in Kali Linux. Crunch is an easy to use tool for generating a custom made password list used for brute force password cracking. Crunch comes as a standard tool in Kali Linux. This tutorial shows you how easy it is to generate a password […]

By |July 29th, 2015|Papers|

Scanning Webservers with Nikto for vulnerabilities

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This tutorial shows you how to scan webservers for vulnerabilities using Nikto in Kali Linux. Nikto is a webserver assessment tool to find potential problems and vulnerabilities very quickly. Nikto comes standard as a tool with Kali Linux and should be your first choice when pen testing webservers and web applications. Nikto […]

By |July 29th, 2015|Papers|