top of page
Welcome
to my Blog
explore more, deepen your horizon, and gain a comprehensive awareness as to Cybersecurity
Articles


CyberPath for the newCyberians
Steps as a roadmap: Fundamental Certifications that could be earned for beginners: Source: startacybercareer.com
28 Ara 20221 dakikada okunur
11
0


Phishing Simulation: is it so easy, yes it is…
Phishing and social engineering are trending because they exploit human psychology rather than relying solely on technical hacking...
5 Tem 20243 dakikada okunur
0


Uncovering the Threat: How Does NTFS Alternate Data Stream (ADS) Hide Embedded Malware?
Alternate Data Streams (ADS) is a file attribute found only in the NTFS file system. In this system a file is composed of several...
24 Haz 20243 dakikada okunur
0


PART-2 / Exploring the Efficacy of Custom Reconnaissance on ICS/SCADA: OT Security&Pentest
In the previous article, we have already discussed on how risky open port and discoverable services in public internet at OT sector. In...
30 May 20242 dakikada okunur
0


PART-1 / Exploring the Efficacy of Custom Scripts on ICS/SCADA: OT Security&Pentest
Many devices are executable without authentication. With enumeration, it can be mapped on the network to gather info such as PLC type,...
12 May 20243 dakikada okunur
0


Network Simulation Lab Training: EVE-NG vs Cisco Packet Tracer
Networking has a vital role in connecting devices. At this point, network simulation plays a critical role. Before establishing a...
4 Oca 20244 dakikada okunur
0


Beef; yes it is, something edible, but not meat: The Browser Exploitation Framework (BeEF)
The Browser Exploitation Framework (BeEF) is a tool used mostly for honeypot and social engineering under the penetration testing. It...
7 Tem 20232 dakikada okunur
0


IDOR/Broken Access Control with BurpSuite
Refence: OWASP Report When we visit a website, web applications obtains us to access the content through objects. These objects describe...
22 Haz 20232 dakikada okunur
0


Fortigate IPsec Tunneling between Sites on EVE-NG Lab
How to secure remote access to an enterprise network system? Demand for reliable and secure virtual networks is growing day by day. One...
1 Haz 20232 dakikada okunur
0


Persistence on Windows with BackDoors (4/4)
4. Windows Login screen with Sticky Keys or Utilman It is the last part of basic backdooring for persistence. In our case, we have...
31 May 20231 dakikada okunur
0


Persistence on Windows with BackDoors (3/4)
3. Dumping hashes and assigning admin privileges for unprivileged users This is the 3rd part of the persistence series, and I will walk...
19 May 20232 dakikada okunur
0


Persistence on Windows with BackDoors (2/4)
2. Using executable files modified by msfvenom Let’s continue placing payload on target machine. We can modify any mini-tools for Windows...
11 May 20231 dakikada okunur
0


Persistence on Windows with BackDoors (1/4)
To be ensure not losing the gained access on target device, we should create alternative ways to get re-access without exploitation, yet...
11 May 20231 dakikada okunur
0


using Hydra on Login pages with a right method: dvwa training
Hydra as a password cracking tool benefits also for dictionary attacks. It performs on many protocols such as RDP, SSH, FTP and HTTP. In...
9 May 20232 dakikada okunur
0


manually cgi-bin / shellshock Exploitation w/o Metapsloit
As it's known, cgi-bin is a directory that contains .cgi (Common Gateway Interface) command scripts, provide functionality with a web...
7 May 20231 dakikada okunur
0


solved: unable to connect Fortigate GUI at .ovf installation on VMware
After the installation of Fortigate image file on VMware Workstation (if the Network Adapter is on Bridged connection), Port1 is going to...
5 May 20231 dakikada okunur
0


How to reset a lost password: Fortigate
Instead of "admin" account, the usage of "maintainer" accout is going to fix our issue, but note that do not skip to type a key prefix ...
4 May 20231 dakikada okunur
0


Common port numbers
Source: packetlife.net by Jeremy. S.
28 Ara 20221 dakikada okunur
0


CyberPath for the newCyberians
Steps as a roadmap: Fundamental Certifications that could be earned for beginners: Source: startacybercareer.com
28 Ara 20221 dakikada okunur
0


A Glossary of Common Terminology
Cyber Dictionary provides you with the most common cyber security terminology (as defined in the well-known standards) for knowledge and...
28 Ara 202213 dakikada okunur
0
bottom of page