Gourav Dhar
- Jun 13, 2022
- 1 min
Spoofing file extensions — Ethical Hacking
File extension spoofing is a handy trick when creating trojans. In this blog, I will be spoofing the ‘.exe’ extension to the ‘.jpg’...
Gourav Dhar
- Jun 13, 2022
- 4 min
Information Gathering — First Step towards Website Hacking
Hacking a website? Don’t miss out on this important step! Before hacking a website or a resource, it is a good practice to first...
Gourav Dhar
- Jun 6, 2022
- 2 min
How to securely browse the Internet | Prevent data leaks while connecting to public WiFi network
Feeling insecure while browsing on public WiFi? This blog is for you. Risk related to Public wifi networks Whenever someone connects to...
Gourav Dhar
- May 30, 2022
- 5 min
Man in the Middle Attack by ARP Spoofing: Tutorial and Examples
What is Man in The Middle (MITM) Attack? A man in the middle (MITM) attack is a general term for when a machine positions itself in...
Gourav Dhar
- May 23, 2022
- 4 min
Hack WiFi Passwords
Almost all modern-day wifi routers use WPA2 encryption. The WEP connections or WPS-enabled networks were easier to hack into because of...
Gourav Dhar
- May 16, 2022
- 1 min
How to change MAC Address?
MAC Address stands for Media Access Control. It is a unique address specific to a device set by the device manufacturer. No two devices...