Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Saturday, May 10, 2025

Author: Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

Hack Website Database using Sqlmap Wizard

Shubham Goyal18 October 202018 October 2020
Web Penetration Testing

Hey Folks, we have again come up with another topic which is related to sqlmap tool. In this tool tutorial we will cover the “wizard” feature of the sqlmap tool which will help speed up our work. Usually we first dump the database, then their tables, columns and so on […]

Continue Reading

Take Meterpreter of Website using Sqlmap ( OS-Shell )

Shubham Goyal18 October 202018 October 2020
Web Penetration Testing

Hey Folks, in this tutorial we will discuss about another topic related to sqlmap tool. If you have not read our previous article related to sqlmap then you must read it, because all your doubts related to database hacking will go away after reading those articles. We are assuming that […]

Continue Reading

Multiple Ways to Dump Website Database via Sqlmap

Shubham Goyal18 October 202018 October 2020
Web Penetration Testing

Hey folks, we have again come up with another topic which is related to sqlmap tool. As you may have seen our previous article in which we have described the complete steps to dump web application’s database with the help of sqlmap and I think you should revisit that article […]

Continue Reading

Website Penetration Testing and Database Hacking with Sqlmap

Shubham Goyal18 October 202018 October 2020
Web Penetration Testing

Hey Folks, in this tutorial we are going to demonstrate database hacking through one of the most valuable tool called is “sqlmap“. The tutorial is designed for education purposes only where we will point you to the complete steps to acquire a web server due to the vulnerability of sql […]

Continue Reading

Multiple Methods to Banner Grabbing

Shubham Goyal14 October 202014 October 2020
Web Penetration Testing

Hey Folks, in this tutorial we’ll take a look at the various tools through which we can perform reconnaissance to obtain important information about a network services, known as “Banner Grabbing“. Basically the banner grabbing is an technique used to gain information about a computer system on a network and […]

Continue Reading

Clickjacking Attacks, Vulnerability and Mitigation

Shubham Goyal13 October 202013 October 2020
Web Penetration Testing

Hey Folks, in this tutorial we are going to be cover an interesting topic that you can pronounce as “Clickjacking” vulnerability. This vulnerability is often found in web applications that can be easily exploited and mitigated by attackers and developers. Simple 🙂 !! In this tutorial we will talk about […]

Continue Reading

How To Bypass Google TFO (OTP)

Shubham Goyal9 October 202019 October 2020
Andorid Hacking / Ethical Hacking

Hey Folks, in this tutorial we’ll show you how we can bypass Google two-factor authentication via a phishing attack. As we know that we have the credentials of the victim account but we are sometimes stuck due to two factor authentication, hence we are not able to acquire the victim’s […]

Continue Reading

Lockphish – Phishing Tool For Android PIN and iPhone Passcode

Shubham Goyal9 October 20209 October 2020
Andorid Hacking / Exploiting Tools

Hey Folks, In this tutorial we are going to talk about an credential dumping tool but it is quite different from the others tool because it is designed to grab the lock screen pins of the smartphone by phishing attack. Through this tool we can get lock screen passwords of […]

Continue Reading

Full Undetectable Android Payload (RAT) Tool

Shubham Goyal9 October 20209 October 2020
Andorid Hacking / Exploiting Tools

Hey guys, the article is going to be interesting because in this tutorial we will present you such a (RAT) remote administration tool with the help of which you can easily control someone else’s android smartphone. We think it does not require any other tools that’s why you can control […]

Continue Reading

Posts pagination

Previous 1 … 17 18 19 … 32 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy