
Gourav Dhar
- Aug 1, 2022
- 4 min
How to perform a basic SQL Injection Attack? — Ethical Hacking
How does a SQL Injection attack work? SQL injection attack is possible when a website exposes inputs to be taken from the user and uses...


Gourav Dhar
- Jul 25, 2022
- 4 min
How hackers impersonate email-id’s : Email Spoofing and Phishing Attacks
Email Spoofing Email Spoofing is a type of cyber-attack where the attacker sends fake emails which appear to have been sent by a...


Gourav Dhar
- Jul 18, 2022
- 3 min
Finding Vulnerable Info Using Google Dorks — Ethical Hacking
Google Dorking is a technique that hackers use to find information that may have been accidentally exposed to the internet. What is...

Gourav Dhar
- Jul 4, 2022
- 4 min
How I created an undetectable Backdoor for Windows — Ethical Hacking
What is a Backdoor? Backdoor is a method of secretly gaining remote access to a computer by bypassing the normal authentication and...

Gourav Dhar
- Jun 27, 2022
- 3 min
How I created my first Web Crawler!
What is a web crawler? A web crawler is a bot that crawls the internet to index and downloads the contents of websites for scraping. Web...

Gourav Dhar
- Jun 20, 2022
- 3 min
How I created a Trojan Malware — Ethical Hacking
A Trojan horse (or Trojan) is one of the most common and dangerous types of threats that can infect your computer or mobile device. What...


Gourav Dhar
- Jun 13, 2022
- 1 min
Spoofing file extensions — Ethical Hacking
File extension spoofing is a handy trick when creating trojans. In this blog, I will be spoofing the ‘.exe’ extension to the ‘.jpg’...


Gourav Dhar
- Jun 13, 2022
- 4 min
Information Gathering — First Step towards Website Hacking
Hacking a website? Don’t miss out on this important step! Before hacking a website or a resource, it is a good practice to first...


Gourav Dhar
- Jun 6, 2022
- 2 min
How to securely browse the Internet | Prevent data leaks while connecting to public WiFi network
Feeling insecure while browsing on public WiFi? This blog is for you. Risk related to Public wifi networks Whenever someone connects to...


Gourav Dhar
- May 30, 2022
- 5 min
Man in the Middle Attack by ARP Spoofing: Tutorial and Examples
What is Man in The Middle (MITM) Attack? A man in the middle (MITM) attack is a general term for when a machine positions itself in...