What is Searchsploit and Its Use
One of our essentials in penetration tests is of course searchsploit. He presents the exploits in ExploitDB to us from the terminal and also provides …
Knowledge pool for Information Technologies
One of our essentials in penetration tests is of course searchsploit. He presents the exploits in ExploitDB to us from the terminal and also provides …
We will explain in detail the distribution of BGInfo with Group Policy in Active Directory environment. Before starting how to distribute, it would be useful …
There are two types of approaches in today’s information security. A proactive approach is generally accepted. Penetration tests and vulnerability assessment are one of the …
Corruption, theft and abuse have now gone from paper to electronic media, and almost all of the data in public and private institutions are now …
The scalpel is one of the nice tools that can be used for recovering files that have been deleted from the system for one reason …
More than 15 billion stolen login credentials are being sold on the dark web, according to information obtained by cybersecurity company ESET. An average of …
Most users visit the device manager to install drivers after Windows installation. Device manager is the new target of Microsoft’s migration strategy. With Windows 10 …
In our previous article, we talked about the general configuration of Windows Server 2016 File Server. Let’s define an example template in this article. For …