What is Mimikatz? Using Mimikatz in the Post-Abuse Process
After using the weaknesses of a machine, exploiting that machine and buying a meterpreter shell, I will talk about the mimetic module and its use …
Knowledge pool for Information Technologies
After using the weaknesses of a machine, exploiting that machine and buying a meterpreter shell, I will talk about the mimetic module and its use …
Before we start with Gophish, we will explain what Phishing is. What is Phishing? It is a type of online attack in which fraudsters send …
DEP (Data Execution Prevention) is a security feature that comes with Windows XP SP2. It prevents some unauthorized codes from running on certain memory sections …
Cross-Site Scripting (XSS) is a weakness that occurs if the developer does not pass the input from the user through the required HTML and JavaScript …
DVWA(Damn Vulnerable Web Application), For pentesters and web security users who want to improve themselves in the field of web application security. It is an …
Source code analysis(SCA) is the automatic testing of a program’s source code to find and fix errors before the application is sold or distributed. It …
When I wanted to work with the Wireshark program that is ready for quality, I encountered an error like the following on my screen. Let’s …
In our first image, we see compatibility_level as 140, which came in 2017. This can be confusing for “downgrade” operation. Changing this from 120 “compatibility_level” …
It is a free platform developed in Python and Ruby languages that allows servers under your Ansible management to do everything you want under one …
Oracle VirtualBox is a successful virtualization application. After installing this application on your computer, you can install as many different operating systems as you want …