PinnedAhmet Talha ŞeninInfoSec Write-upsEthical Hacker’s Passive Reconnaissance ToolkitUnlocking Secrets: Ethical Hacking & Passive Reconnaissance6 min read·Sep 20, 2023--1--1
Ahmet Talha ŞeninInfoSec Write-upsHTB CTF: Cracking Passwords with HashcatHashcat with my comprehensive guide. Crack various types of hashes efficiently, from SQL injections to Kerberoasting attacks.11 min read·Apr 15, 2024--1--1
Ahmet Talha ŞeninInfoSec Write-upsScanning for SMB Vulnerabilities with enum4linux15 min read·Oct 15, 2023----
Ahmet Talha ŞeninInfoSec Write-upsCorporate Reconnaissance and Data Analysis: A Guide to Ethical HackingUnveiling the Secrets of Ethical Hacking Reconnaissance3 min read·Sep 19, 2023----
Ahmet Talha ŞeninSystem WeaknessSolving the XSS HTB CTF ChallengeSolving the XSS HTB CTF Challenge4 min read·Sep 9, 2023----
Ahmet Talha ŞeninSystem WeaknessInformation Gathering — Web Edition: CTF SolutionInformation Gathering4 min read·Aug 31, 2023----
Ahmet Talha ŞeninSystem WeaknessSolving Web Proxies CTF ChallengeSeveral Capture The Flag (CTF) difficulties including web proxies, request manipulation, decoding, fuzzing, and other techniques…6 min read·Aug 26, 2023----
Ahmet Talha ŞeninSystem WeaknessSolving File Inclusion CTF Challenges — A Step-by-Step GuideFile Inclusion CTF Challenges5 min read·Aug 13, 2023----
Ahmet Talha ŞeninSystem WeaknessSolving the Skills Assessment: File Inclusion and Log PoisoningFile Inclusion and Log Poisoning6 min read·Aug 12, 2023----
Ahmet Talha ŞeninInfoSec Write-upsSolving the HTB CTF — Broken AuthenticationExploring the World of CTF: Unraveling Broken Authentication Vulnerabilities4 min read·Jul 31, 2023----