DIGITAL FORENSICS

Uygulamalar

  • FTK Imager
  • The Sleuth Kit
  • Autopsy

WEB APP. SECURITY: HACKING & DEFENCE

OWASP Top 10 2021

Atak Tipleri

  • Brute Force
  • Dictionary Attack
  • Command Injection
  • Cross Site Request Forgery (CSRF)
  • SQL Injection
  • Cross-Site Scripting (XSS)

Blog Yazıları

  • Zafiyet Veritabanları : OWASP, CVE ve CWE
  • Güvenlik Sertifikalarının Değerlendirilmesi
  • DVWA ile Brute Force ve Dictionary Attack Örneği
  • DVWA ile Command Injection ve CSRF Örneği
  • DVWA ile Local File Inclusion ve Remote Fıle Inclusion Örneği
  • DVWA ile SQL Injection Örneği
  • Wireshark İle Malware Analizi

Uygulamalar

  • MITRE ATT&CK®
  • Metasploit
  • DVWA
  • Metasploit Meterpreter
  • Wireshark
  • Burpsuite
  • Nmap

İşletim Sistemleri

  • Kali
  • SIFT
  • Metasploitable

 

 

  • The victim discovery part of cybersecurity is less emphasized, but very important. These search queries are known informally as “googledorks.” Using Google with particular search parameters, hackers can generate a list of potential victim sites.