Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

Ransomware infection and removal guide

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Tox Ransomware is malware which encrypts your hard drive and demands money in exchange for decryption. After CTB-Locker, Teslacrypt, CryptoWall, Cryptolocker and TorrentLocker, Tox is the new ransomware on the block. Tox is set up as a Ransomware-as-a-service where Tox developers take 20% of the paid ransoms. Tox (or toxicola ransomware) is only accessible over the TOR […]

By |July 29th, 2015|Papers|

Scanning Directories using Websploit

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In the next few tutorials I will explain how to use the different Websploit modules. WebSploit is an open source project for web application assessments. In this tutorial we will be using the websploit directory scanner module and we will add some custom directories. Websploit directory scanner is a script which […]

By |July 29th, 2015|Papers|

Installing VPN on Attacking Machine

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

VPN on Kali Linux is strangely not installed and enabled by default which leaves you with a greyed out VPN option panel. VPN stands for Virtual Private Network and extends your private network over the internet. In this tutorial we will install the necessary packages and setup the popular VyprVPN service in Kali […]

By |July 29th, 2015|Papers|

Cloudflare IP resolving using websploit.

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be testing and using the Cloudflare resolver module in Websploit on Kali Linux. Cloudflare is a company that provides a content delivery network and distributed DNS (Domain Name Server) services, sitting between the visitor and the hosting provider of the Cloudflare user. This way Cloudflare is acting […]

By |July 29th, 2015|Papers|

Spoofing MAC Address using Kali

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

MAC address spoofing is a technique for changing your Media Access Control (MAC) address on a network device. A MAC Address is a unique and hardcoded address in network devices which cannot be changed. Macchanger is a tool included with Kali Linux and can change the MAC address to any desired address until […]

By |July 29th, 2015|Papers|

Wifi Hacking Tools

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In Wifi Hacking Tools we will be talking about a very popular subject: hacking wireless networks and how to prevent it from being hacked. Wifi is often a vulnerable side of the network when it comes to hacking since signals can be picked up everywhere and by anyone. Router manufacturers and ISPs […]

By |July 26th, 2015|Papers|

Hack Team Exploit Demo, How they used to Hack..

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

In this tutorial we will be importing the CVE-2015-5122 (Adobe Flash opaqueBackground Use After Free) zero day Flash Exploit module in Metasploit and have a vulnerable setup download the malicious Flash file. Recent versions of Adobe Flash Player contain critical vulnerabilities within the ActionScript 3 ByteArray, opaqueBackground and BitmapData classes. Exploiting […]

By |July 26th, 2015|Papers|

Packet Fingerprinting with Wireshark and Detecting NMap Scans

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

This is going to be a fairly long tutorial on Wireshark. This is if you have had some sort of experience with wireshark and nmap, and you should have an above-average understanding of some basic protocols.

We will be covering some major scans including:
TCP Scans (Transmission Control Protocol)
~ TCP SYN scan […]

By |July 22nd, 2015|Papers|

How to crack accounts with Sentry

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

I’ve been getting a lot of questions on how to crack accounts via SentryMBA so I have decided to take some of my time and make a tutorial for the beginners!

Things you will need:

SentryMBA — http://www.sendspace.com/file/l0r5lh
PoizonProxyProcessor_v1.0 — http://www.sendspace.com/file/1x312z
AIOHNB — http://www.sendspace.com/file/i1q1bi
Sentry Configs — http://www.sendspace.com/file/94ht2k
Combo2Email — http://www.sendspace.com/file/7901ra
________________________________________________________________

Step #1.
– Download SentryMBA

– Once you […]

By |July 22nd, 2015|Papers|

Password Sniffing using Wireshark

Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Wireshark Password Sniffing

Tools:
• Alpha wireless card
• Kali Linux
• Ettercap (Man in Middle tool)
• Sslstrip(Turns HTTPS into HTTP so we can see passwords in clear text)
• Wireshark (Packet sniffer)

First login to your Kali Machine. After logging in we need to forward port 80 to port 10000 which is what sslstrip will […]

By |July 21st, 2015|Papers|