What is Burp Suite? How to use? Example Brute Force Attack with Burp Suite
We will view the requests between “Burp Suite” and the client/server and make the necessary changes to the requests. As soon as Burp Suite starts …
Knowledge pool for Information Technologies
We will view the requests between “Burp Suite” and the client/server and make the necessary changes to the requests. As soon as Burp Suite starts …
We will see the steps we need to check when we have a problem with the ip in our Centos operating system. First step First …
Karmetasploit is a program used to create access points, capture passwords, collect information and perform web browser attacks. You create a fake modem or Access …
Powershell is a command-line tool and also a programming language offered by Microsoft for managing system configurations. Powershell comes integrated with all operating system versions …
We will explain the steps to solve problems in Linux servers. It is an article we prepared to give an example. We will continue with …
The nslookup command helps to find a page’s TCP/IP number. Nslookup is one of the tools that come with the TCP/IP protocol installed on the …
All of the internet users are faced with the Dark web concept in one way or another. The Deep web is known as the dark …
In the Windows operating system, local accounts authenticate via SAM and SYSTEM files. Therefore, the security of SAM and SYSTEM files is critical. The password …
Two critical vulnerabilities with a CVSS 3.1 Score of 9.8, a critical vulnerability of 9.0 and a high-level vulnerability of 8.8 have been published in …
In the Windows operating system, local accounts authenticate via SAM and SYSTEM files. Therefore, the security of SAM and SYSTEM files is critical. The password …