Gourav DharJul 4, 20224 min readNETWORK SECURITYHow I created an undetectable Backdoor for Windows — Ethical HackingWhat is a Backdoor? Backdoor is a method of secretly gaining remote access to a computer by bypassing the normal authentication and...
Gourav DharJun 27, 20223 min readNETWORK SECURITYHow I created my first Web Crawler!What is a web crawler? A web crawler is a bot that crawls the internet to index and downloads the contents of websites for scraping. Web...
Gourav DharJun 20, 20223 min readNETWORK SECURITYHow I created a Trojan Malware — Ethical HackingA Trojan horse (or Trojan) is one of the most common and dangerous types of threats that can infect your computer or mobile device. What...
Gourav DharJun 13, 20221 min readNETWORK SECURITYSpoofing file extensions — Ethical HackingFile extension spoofing is a handy trick when creating trojans. In this blog, I will be spoofing the ‘.exe’ extension to the ‘.jpg’...
Gourav DharJun 13, 20224 min readNETWORK SECURITYInformation Gathering — First Step towards Website HackingHacking a website? Don’t miss out on this important step! Before hacking a website or a resource, it is a good practice to first...
Gourav DharJun 6, 20222 min readNETWORK SECURITYHow to securely browse the Internet | Prevent data leaks while connecting to public WiFi networkFeeling insecure while browsing on public WiFi? This blog is for you. Risk related to Public wifi networks Whenever someone connects to...
Gourav DharMay 30, 20225 min readNETWORK SECURITYMan in the Middle Attack by ARP Spoofing: Tutorial and ExamplesWhat is Man in The Middle (MITM) Attack? A man in the middle (MITM) attack is a general term for when a machine positions itself in...
Gourav DharMay 23, 20224 min readNETWORK SECURITYHack WiFi PasswordsAlmost all modern-day wifi routers use WPA2 encryption. The WEP connections or WPS-enabled networks were easier to hack into because of...
Gourav DharMay 16, 20221 min readNETWORK SECURITYHow to change MAC Address?MAC Address stands for Media Access Control. It is a unique address specific to a device set by the device manufacturer. No two devices...
Gourav DharMay 9, 20223 min readMISCELLANEOUSCreate a stunning portfolio website with your own website name from scratch within 1 hourHey Guys! Check out my website at www.gourav-dhar.com At the end of this blog you will have a hosted website similar to mine. So let’s...