Tag Archives: website hacking in hindi

What is Improper Input Validation Vulnerability ?

By | September 8, 2021

In this article, we are telling you about Improper Input Validation Vulnerability, you may not have heard much about Improper Input Validation Vulnerability because it is not talked about much. Improper Input Validation Vulnerability is also rare but still you must know about it, here we are telling you both theory or practically about Improper… Read More »

What is File Upload Vulnerability ?

By | February 13, 2021

In this article, we are telling you about file upload vulnerability and How to find File Upload Vulnerability in a website. How to do this attack automatically. We have already told you about the file path traversal attack, but the file upload vulnerability is different, here we are also telling you how you can find… Read More »

How to Bypass Cloudfare ?

By | February 8, 2021

In this article, we are telling you about how to bypass cloudfare. you must have also noticed many times when you bug bounty, in which case you need to bypass cloudfare. Here we are telling you how hackers bypass Cloudfare or how you can bypass Cloudfare while bug bounty so that you can do bug… Read More »

What is Json Vulnerabilities OWASP ?

By | February 3, 2021

In this article, we are telling you about json vulnerability owasp, you may have never heard of json vulnerabilities owasp because very few people know about it. This is because there is not much talk about json vulnerabilities owasp and it is very rare that there is not much information about this bug in some… Read More »

What is Websockets Security Vulnerabilities ?

By | January 28, 2021

In this article, we are telling you about Websockets Security Vulnerabilities, whether you call it Websockets Vulnerabilities or Websockets Security issues the same thing happens. Here we are telling you deeply about Websockets Security Vulnerabilities, here we are also telling you it practically how you can find this bug in a website. Also, in what… Read More »

What is HTTP Request Smuggling Vulnerability ?

By | January 26, 2021

In this article we are telling you about HTTP Request Smuggling Vulnerability like what is HTTP Request Smuggling Vulnerability and how this bug is found in a website. Here you may not have heard the name of HTTP Request Smuggling Vulnerability before because this bug is not talked about too much but it is also… Read More »

Bypass Website Two factor authentication ?

By | December 1, 2020

In this article, we are telling you about how to bypass website two factor authentication, you must also have heard about website two factor authentication at some time. How all this is done, how hackers bypass the limit of website two factor authentication in a website, it is being told by doing practical here, here… Read More »

What is XML external entity injection ?

By | November 2, 2020

In this article, we are being told about XML external entity injection. You may not have heard about your XML external entity injection before because very little is talked about it. In such a way, how to find the XML external entity injection bug and what it is, not everyone knows, but we want to… Read More »

What is Open Redirect Vulnerability (practical)?

By | October 15, 2020

We are telling you about Open Redirect Vulnerability. It is also called unvalidated redirects and forwards. What is Open Redirect Vulnerability and how it works. You must also have heard about Open Redirect Vulnerability at some point, here is how hackers can take advantage of this Vulnerability, how it is done, all your questions will be… Read More »