Derya CortukOS InjectionsOS injections, also known as Operating System injections, involve exploiting vulnerabilities in an operating system to gain unauthorized…Feb 14Feb 14
Derya CortukFunction Prologue and EpilogueFunction prologue and epilogue represent specific operations performed at the beginning and end of a function, respectively. These…Feb 7Feb 7
Derya CortukApplication Binary InterfaceApplication Binary Interface (ABI) is a standard that defines the interface between compiled applications and the operating system on a…Feb 7Feb 7
Derya CortukOpen Source IntelligenceOpen Source Intelligence (OSINT) is the practice of collecting and analyzing information from publicly available sources to obtain…Feb 1Feb 1
Derya CortukContent Security PolicyContent Security Policy (CSP) is a security standard that helps protect web applications against various types of attacks, including…Feb 1Feb 1
Derya CortukCross-Site ScriptingXSS, or Cross-Site Scripting, is a type of security vulnerability that occurs in web applications when an attacker injects malicious…Jan 31Jan 31
Derya CortukInsecure Direct Object ReferencesInsecure Direct Object References, IDOR, is a security vulnerability that occurs in web applications when user input is not properly…Jan 31Jan 31
Derya CortukSQL InjectionSQL Injection(SQLi), a malicious technique used by hackers to exploit vulnerabilities in web applications, is a dark and powerful weapon in…Jan 31Jan 31
Derya CortukCross-Site Request Forgery (CSRF)CSRF, or Cross-Site Request Forgery, is a malicious attack that the trust between a user’s browser and a website they are authenticated on…Jan 31Jan 31
Derya CortukReverse Engineering ToolsReverse engineering tools are used to analyze and understand the internal structure, behavior, and functionality of software, firmware, or…Jan 13Jan 13