Gourav DharAug 102 min readNETWORK SECURITYEncryption in TypescriptI have coded for encrypting data using the 'aes-256-cbc' algorithm.
Gourav DharAug 1, 20224 min readNETWORK SECURITYHow to perform a basic SQL Injection Attack? — Ethical HackingHow does a SQL Injection attack work? SQL injection attack is possible when a website exposes inputs to be taken from the user and uses...
Gourav DharJul 25, 20224 min readNETWORK SECURITYHow hackers impersonate email-id’s : Email Spoofing and Phishing AttacksEmail Spoofing Email Spoofing is a type of cyber-attack where the attacker sends fake emails which appear to have been sent by a...
Gourav DharJul 18, 20223 min readNETWORK SECURITYFinding Vulnerable Info Using Google Dorks — Ethical HackingGoogle Dorking is a technique that hackers use to find information that may have been accidentally exposed to the internet. What is...
Gourav DharJul 4, 20224 min readNETWORK SECURITYHow I created an undetectable Backdoor for Windows — Ethical HackingWhat is a Backdoor? Backdoor is a method of secretly gaining remote access to a computer by bypassing the normal authentication and...
Gourav DharJun 27, 20223 min readNETWORK SECURITYHow I created my first Web Crawler!What is a web crawler? A web crawler is a bot that crawls the internet to index and downloads the contents of websites for scraping. Web...
Gourav DharJun 20, 20223 min readNETWORK SECURITYHow I created a Trojan Malware — Ethical HackingA Trojan horse (or Trojan) is one of the most common and dangerous types of threats that can infect your computer or mobile device. What...
Gourav DharJun 13, 20221 min readNETWORK SECURITYSpoofing file extensions — Ethical HackingFile extension spoofing is a handy trick when creating trojans. In this blog, I will be spoofing the ‘.exe’ extension to the ‘.jpg’...
Gourav DharJun 13, 20224 min readNETWORK SECURITYInformation Gathering — First Step towards Website HackingHacking a website? Don’t miss out on this important step! Before hacking a website or a resource, it is a good practice to first...
Gourav DharJun 6, 20222 min readNETWORK SECURITYHow to securely browse the Internet | Prevent data leaks while connecting to public WiFi networkFeeling insecure while browsing on public WiFi? This blog is for you. Risk related to Public wifi networks Whenever someone connects to...