Gourav Dhar
- Aug 1, 2022
- 4 min
How to perform a basic SQL Injection Attack? — Ethical Hacking
How does a SQL Injection attack work? SQL injection attack is possible when a website exposes inputs to be taken from the user and uses...
Gourav Dhar
- Jul 25, 2022
- 4 min
How hackers impersonate email-id’s : Email Spoofing and Phishing Attacks
Email Spoofing Email Spoofing is a type of cyber-attack where the attacker sends fake emails which appear to have been sent by a...
Gourav Dhar
- Jul 18, 2022
- 3 min
Finding Vulnerable Info Using Google Dorks — Ethical Hacking
Google Dorking is a technique that hackers use to find information that may have been accidentally exposed to the internet. What is...
Gourav Dhar
- Jul 4, 2022
- 4 min
How I created an undetectable Backdoor for Windows — Ethical Hacking
What is a Backdoor? Backdoor is a method of secretly gaining remote access to a computer by bypassing the normal authentication and...
Gourav Dhar
- Jun 27, 2022
- 3 min
How I created my first Web Crawler!
What is a web crawler? A web crawler is a bot that crawls the internet to index and downloads the contents of websites for scraping. Web...
Gourav Dhar
- Jun 20, 2022
- 3 min
How I created a Trojan Malware — Ethical Hacking
A Trojan horse (or Trojan) is one of the most common and dangerous types of threats that can infect your computer or mobile device. What...