Reverse Shell and Backdoor: What Are the Differences? Understanding the concepts of Backdoor and Reverse Shell enables you to acquire…
Blog
What is Penetration Test? Penetration Testing, also known as “Sızma Testi” in Turkish, is the process of testing a computer…
Cybersecurity is an important issue that everyone should pay attention to today. Research on this subject once again emphasizes the…
In our globalized world, human relationships have moved to the virtual environment through technological advancements. As a result, people have…
Attack Surface: What is it? Attack surface is the whole structure of a company, a system or a critical infrastructure…
In a continuously growing internet environment, new threats are emerged every day. There are many different types of these threats, and…
Olay Nedir? Geçtiğimiz günlerde (23 Mayıs 2021), Microsoft Exchange’e erişmeye çalışan kullanıcılar admin.exchange.microsoft.com portalında süresi dolmuş sertifika’dan dolayı güvensiz bağlantı…
CVE Nedir? CVE (Common Vulnerabilities and Exposures), halka açık olarak sunulan bir zafiyet sözlüğüdür. Bu sözlüğün yaratılma amacı zafiyetler hakkında…
NOTE: All the methods I have explained are at your own risk Open Source Intelligence(OSINT) is one of the first techniques…