Techno Webhack
I’m Parikshit, I am having over 10 + years of experience in security area in IT industry and have done many kind of security work in organizations from offensive and defensive perspective for the infrastructure, network, web applications and API’s, containers, etc.
I am here to help you learn the Cyber security from offensive as well as defensive side.
Here you will learn about Web application security, API Security, Infrastructure and Network security concepts, also you will learn about Linux, Networking, computer tricks and tips and a lot about Cyber world.
This channel is intended to help you gain knowledge on how computer/android/network hackers can target your system or device and educate you to prevent from such attacks.
The another aim of our channel is to help people who are interested in the field of information security tutorials and to help people to secure their own computers as well as organizations from the latest computer threats.
Thanks…
How to Prevent from Remote File Inclusion Vulnerability - Part(8.2)
What is Remote File Inclusion Attack and How to Exploit it - Part( 8.1)
How to prevent from LFI Vulnerability - Part (7.3)
How to Find and Exploit LFI Vulnerability - Part (7.2)
What is Local File Inclusion Vulnerability - Part (7.1)
How to prevent from CORS Vulnerability - Part (6.3)
How to find and exploit CORS Vulnerability - Part (6.2)
What is CORS Vulnerability - Complete Tutorial - Part (6.1)
How to Prevent from SSRF Attacks - Part (5.2)
What is SSRF - How to Find and Exploit It - Part (5.1)
How to Prevent from CSRF Attack - Part (4.2)
What is Cross Site Request Forgery Attack and How to find and exploit it - Part (4.1)
How to Prevent from XXE Attacks - Part (3.5)
How to Exploit XXE using XInclude and Image file upload - Part (3.4)
What Blind XXE - How to Find and Exploit it - Part (3.3)
How to Find and Exploit XXE - SSRF Using XXE - Part (3.2)
What is XXE Injection - External Entity Injection - Part (3.1)
How to Prevent from XSS Attacks - Part (2.4)
What is DOM Based XSS - Part (2.3)
What is Stored Cross Site Scripting - Part (2.2)
What is Reflected Cross Site Scripting - Part (2.1)
How to Prevent from SQL Injection Part - (1.3)
What is Blind SQL Injection - Part (1.2)
What is SQL injection and How to find and exploit it - Part 1
How to fix Port 443 Conflict Between Vmware And Xampp
How to do Port Forwarding Using Ngrok
EXPLOIT COMPLETED, NO SESSION IS CREATED !!!
How To Fix database Not Connected Error In Metasploit
How To Resolve bridge Network Issue In Vmware - Permanant-fix
How To Use Repeater And Sequencer in Burpsuite - Part 8