Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Thursday, May 15, 2025

Author: Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

PHP Code Injection – Attacks and Mitigation

Shubham Goyal9 August 20209 August 2020
Web Penetration Testing

OWASP is a standard awareness document for the top 10 developers and web application security known as the “Open Web Application Security Project“. Today we are going to talk about another injection vulnerability and this article will really helpful to all of those people which want to learn about the […]

Continue Reading

SSL Injection – Attacks and Mitigation

Shubham Goyal9 August 20209 August 2020
Web Penetration Testing

Hey Folks, in this tutorial we will discussing on Server-Side Include attack that is also known as SSL Injection. Injection vulnerability usually causes input validation and sometimes we forget to apply blacklist on input fields and the results are very dangerous. Similarly SSL Injection vulnerability occurs when an application incorporates […]

Continue Reading

iFrame Injection – Attacks and Mitigation

Shubham Goyal9 August 20209 August 2020
Web Penetration Testing

Hey folks, in this tutorial we are going to talk about another new injection vulnerability called “iFrame Injection“. iFrame Injection vulnerability is a type of injections vulnerability classified by OWASP TOP 10 2017. After analysis and research we noticed that iFrame vulnerabilities in 2020 are not one of the major […]

Continue Reading

OS Command Injection – Types, Exploit & Mitigation

Shubham Goyal8 August 202011 August 2020
Web Penetration Testing

Hey folks, in this tutorial we are going to talk about the command injection vulnerability. A web server can be completely compromised by the attacker if the command injection vulnerability is on the web application because this vulnerability can give us the privileges to execute the command on the web […]

Continue Reading

HTML Injection : Types & Prevention With Practical

Shubham Goyal8 August 202011 August 2020
Web Penetration Testing

Hey folks, After configure the vulnerable web application today we are going to exploit the vulnerability that will let us know how we can protect our web application and avoid various types of attacks. As we know it has very challenging to find the vulnerability on the web application and […]

Continue Reading

Web Application Pentest Lab Setup on Docker

Shubham Goyal6 August 20206 August 2020
Web Penetration Testing

Hey Folks, In this tutorial we will learn how we can configure the vulnerable web application on docker. As we know that docker gives us the ability to run multiple containers simultaneously on a given host and even we can run containers within host machines that are actually virtual machines. […]

Continue Reading

Web Application Penetration Testing Lab Setup

Shubham Goyal6 August 20206 August 2020
Web Penetration Testing

Hey Folks, After doing the LAMP setup on ubuntu operation system we will configure vulnerable web application on ubuntu. In this tutorial we are going to configure almost all vulnerable web applications which are designed for penetration testing. Requirements Ubuntu Lets do it 🙂 !! bWAAP bWAPP is a vulnerable […]

Continue Reading

Oralyzer – A Automatic Open Redirection Vulnerability Finder

Shubham Goyal3 August 202022 October 2020
Bugbounty Tools / Exploiting Tools

Hey Folks, in this tutorial we are going to talk about an interesting tool called “Oralyzer” which will help us to identifying the open redirections vulnerability in the websites. It will automatically find the vulnerability by adding the vulnerable parameter. Lets take a Look 🙂 !! Installation First we need […]

Continue Reading

Multiple Ways to Hack Facebook Accounts

Shubham Goyal1 August 20202 December 2020
Ethical Hacking / Exploiting Tools

Hey Folks, Today we are going to discuss about the ways by which we can get the credibility of anyone’s Facebook account. As we know that various types of attacks are done to control social media accounts because people are not familiar with it, so with the help of this […]

Continue Reading

Posts pagination

Previous 1 … 23 24 25 … 32 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy