Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Sunday, May 11, 2025

Author: Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

FTP Log Poisoning Through LFI

Shubham Goyal11 May 202022 October 2020
Web Penetration Testing

In this article, you will learn how to take access in any web server through ftp log poisoning if it is suffering from local file inclusion vulnerability. What is PHP File Inclusion ? With the help of include function you can include the content of php into another php file […]

Continue Reading

Hack Wallpaper and Passwords Using Post Exploitation

Shubham Goyal8 May 20208 May 2020
Ethical Hacking / Window Hacking

In this article you will learn, after compromised the victim machine what we can do by using post exploitation. There are 478 post exploitation modules which are available in metasploit framework but in this article we will use only five modules which is working on window 10 machine. What is […]

Continue Reading

Multiple Ways to Create a Payload for Window Exploit

Shubham Goyal7 May 20207 May 2020
Ethical Hacking / Window Hacking

There are several method to take the access on window machine but in this article, we are going to talk about ways to create a payload for windows Exploit. With the help of this article you will learn how to create payload both manually and automatically. Metasploit Framework Metasploit Framework […]

Continue Reading

Access Any Android Phone Without Touching – Ghost Framework

Shubham Goyal5 May 202022 October 2020
Andorid Hacking / Exploiting Tools

In this article, we will going to talk about how to access any android device. There will be many ways to access the android phone but in this method you can access android device without touching the phone. Lets take a look ! What is Android Debug Bridge (ADB) ? […]

Continue Reading

How to Hack Android Phone over the WAN

Shubham Goyal2 May 20206 May 2020
Andorid Hacking / Ethical Hacking

As you know we already discussed about android hacking over LAN ( Local Area Network ). Click here to see. Now in this article we will talk about how to access any android phone over WAN ( Wide Area Network ) without port forwarding. What is LAN ? Local area […]

Continue Reading

Hack SMS, Call Logs, Whatsapp of any Android Phone

Shubham Goyal30 April 202030 April 2020
Andorid Hacking / Ethical Hacking

In the india total number of android mobile users has reached 114 million. Cause of increasing the total number of andorid mobile users the cybercrime has also be incressed. Hence In this article we will discuss how to hack any android phone using metasploit framework and how to protect himself. […]

Continue Reading

Multiple Ways to Create Permanent Backdoor in Remote PC

Shubham Goyal29 April 20208 October 2020
Persistence / Window Hacking

In this article, we will learn how to create a persistent backdoor with the help of metasploit framework on the host machine. What is Persistent Backdoor As we know that persistence also known as permanent. Persistent backdoors help us to take permanent access of system. There are so many types […]

Continue Reading

Complete Footprinting – Ethical Hacking

Shubham Goyal26 April 202029 April 2020
Ethical Hacking / Footprinting

We have already discussed on the types of footprinting and brief introduction on the first three types of footprinting in our first article, you can see it here. Today we are going to talk further about some more type of footprinting like: Lets start !! Competitive Intelligence Competitive intelligence is […]

Continue Reading

Beginner Guide to Footprinting

Shubham Goyal25 April 202030 April 2020
Ethical Hacking / Footprinting

This is the first part of footprinting series, In this article we will discuss first 3 types of footprinting. As we know that there is lot of cyber crimes taking place now a days and we call these persons as hacker. In such a situation, some people are saved and […]

Continue Reading

Posts pagination

Previous 1 … 30 31 32 Next

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy