Extreme Hacking

We work in Dark, to serve the Light

Extreme Hacking /

WinRAR Extension Spoof

Advanced Ethical Hacking Institute in Pune

Hey guys,
Today I am going to briefly show you a neat little exploit that is available in WinRAR, version 4.20. You may or may not of heard of it, but it involves editing WinRAR’s ‘second’ filename.

Prerequisites:
– WinRAR 4.20
– A hex editor.
– A file to spoof.

Method:
– Okay, so first things first you […]

By |July 9th, 2015|Papers|

DDos A Website Using Hping3

Advanced Ethical Hacking Institute in Pune

Hping:-

hping is a command-line oriented TCP/IP packet assembler/analyzer.It supports TCP, UDP, ICMP and RAW-IP protocols.But it can be used as a powerful ddos tool.
By using hping you can do:
Quote:Firewall testing
Advanced port scanning
Network testing, using different protocols, TOS, fragmentation
Manual path MTU discovery
Advanced traceroute, under all the supported protocols
Remote OS fingerprinting
Remote uptime guessing
TCP/IP […]

By |July 9th, 2015|Papers|

POC – How Facebook Account gets Hijacked

Advanced Ethical Hacking Institute in Pune

Step 1 – Grab the user’s email address:
This can be simply done through creating a Yahoo email account and importing contacts from your original Facebook account. To do this, simply create a Yahoo account, login to it, click the large “IMPORT CONTACTS” button and select Facebook.

Step 2 – Finding the user’s […]

By |July 7th, 2015|Papers|

MITM attack on Windows Server 2012 R2

Advanced Ethical Hacking Institute in Pune

As discussed in CEH class when it comes to network attacks, we are constantly looking for the most recent and up-to-date attack vectors in modern network environments. With this tutorial, I’d like to go over the steps needed to become MITM of new network devices in networks with the most up-to-date […]

By |July 7th, 2015|Papers|

Office 2013 EXPLOIT CREATION

Advanced Ethical Hacking Institute in Pune

Creating a document that will download your executable application and executing it isn’t as difficult as you think it is. If you follow this tutorial and use the resources given to you, I have the highest hope that by the end you’ll have a document that will do just that.

Necessary Resources

Please […]

By |July 6th, 2015|Papers|

Coding TCP Bind Shell in Linux ASM

Advanced Ethical Hacking Institute in Pune

 

Now, to all those who are LEARNING ASM, please do not be intimidated by this. This may look advanced due to its shear length, but I assure you it’s fairly simple. ASM files are MUCH longer as it is the lowest level language and there are a lot more commands needed […]

By |July 4th, 2015|Papers|

Metasploit: Simple way to collect email addresses through metasploit

Advanced Ethical Hacking Institute in Pune

As discussed in CEH.

Here is a very easy tutorial on how to collect email addresses with metasploit.

1)First thing to do is open a msfconsole and type

Code:
search gather

2) Type

Code:
use gather/search_email_collector

3) Now you need to set the domain you can use what you want eg gmail.com, yahoo.com for this tutorial we will use gmail.com

Code:
set domain […]

By |July 4th, 2015|Metasploit|

Metasploit: Final Exploit

Advanced Ethical Hacking Institute in Pune

So now we can see again the final exploit. This is all that is necessary to go from PoC to full Metasploit module in a few simple steps. We will be further expanding on this code in later sections going deeper into ways of making a better Metasploit module such as […]

By |June 30th, 2015|Metasploit|

Metasploit: Hosting the Javascript

Advanced Ethical Hacking Institute in Pune

In this section we are going add the listener and the javascript for the exploit. The changes to the exploit are highlighed.

Contents

1 On Request URI
2 Content
3 Send Response HTML

 

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework […]

By |June 30th, 2015|Metasploit|

Metasploit: Making a Log Entry

Advanced Ethical Hacking Institute in Pune

In this section we are going to take a look at sending a GET request to the target. This GET request will contain a User-Agent field with Javascript appended to connect back to Metasploit. The changes to the exploit are highlighed.

Contents

1 Register Options
2 Exploit Get Request
3 Exploit Headers
4 Exploit Data
5 Super

 

##
# […]

By |June 30th, 2015|Metasploit|