Ethical Hacking Workshop India - Main page
Friday, 2015-02-27, 3:25 AM
Welcome Guest | RSS
Site menu
Login form
Join Lucideus
1 2 3 ... 24 25 »
Views: 504 | Added by: defaultNick | Date: 2015-01-31 | Comments (0)


We are happy to share that as per students request Lucideus has started 6 Months Live Project Based Training Program with Placement Opportunity for all the B.Tech / M.Tech / B.C.A. / M.C.A. and other branches as per the university norms in Lucideus Labs ,New Delhi. 

Total Seats : 12 Only

What is the training all about?
It's a training program where you get to see and try from your own hands how a real world hacker works so that you can defend yourself from the attacks. Our program would be about the various susceptibilities of Web Applications and Websites, System Vulnerabilities, flaws in the M... Read more »
Views: 1878 | Added by: defaultNick | Date: 2014-11-25 | Comments (0)

So you think reversing and getting source code of an APK is a big deal. Then give a try to Xenotix APK Decompiler.

APK Decompiler is an Open Source Android Application Package (APK) decompiler powered by dex2jar and JAD written in Python.

Minimum Requirements
OS: Windows
JDK 1.6
Wx Python


Views: 2731 | Added by: defaultNick | Date: 2014-11-05 | Comments (0)

Xiaomi is present third largest smartphone manufacture in the world. But few days ago IAF found Xiaomi stealing the private information, call logs, IMEI numbers and some info to webservers in Beijing china.

The Indian Air force   warned its employees and their belongings that their private information was being shipped over to servers in China, and asked them to avoid using Xiaomi smartphones due to security risk.

 Xiaomi is facing an investigation in Taiwan for alleged cyber security threat, as a result of which last month the Taiwanese government decided to ban the company due to several privacy controversies.

Coming to sales in India, Xiomi’s models Mi3 and Redmis … created a record sales in flipkart by being sold more than 80 k phones in 9-13 seconds.

Rec... Read more »

Views: 1714 | Added by: defaultNick | Date: 2014-11-05 | Comments (0)

Hashcat is the world’s fastest CPU-based password recovery tool.

While it's not as fast as its GPU counterpart localHashcat, large lists can be easily split in half with a good dictionary and a bit of knowledge of the command switches.

Views: 1979 | Added by: defaultNick | Date: 2014-09-14 | Comments (0)

Today we will talk about something interesting , YES :) , As we all know today Android is the best mobile OS and crossed over 80% of global mobile users. Hence in this article we will try to exploit android through the one and only hacker's love - > Metasploit Framework.

1. Kali Linux / Backtrack 5 (Having MSF)
2. Android Phone ( Jelly Beans - I am Using Samsung S3)
3. Common Wireless Network ( Using Hotspot)

I am not gona take much time hence will do it fast in simple steps. So lets go.

Step 1: Open Your Kali terminal and type the following command.

... Read more »

Views: 3537 | Added by: defaultNick | Date: 2014-05-24 | Comments (4)

Join India's Most advance ethical hacking training program LCEH from Lucideus.We are still open with last ‘17’ admissions. Now get HUGE discount for the same as few days left for starting dates of training.

Here are few questions and their answer which you would like to ask us for tra... Read more »

Views: 1907 | Added by: defaultNick | Date: 2014-05-15 | Comments (0)

Views: 780 | Added by: defaultNick | Date: 2014-05-08 | Comments (0)

Kon-Boot enables you logging in to any password protected machine profile without any knowledge of the password.This tool changes the conten... Read more »

Views: 1424 | Added by: defaultNick | Date: 2014-04-13 | Comments (1)