PinnedBüşra GültekinNessus via Metasploitable: How to exploit a vulnerability by using the Nessus tool?Kali Linux, a Linux distribution designed specifically for penetration testing, comes prepackaged with many pen test tools like as I will…12 min read·Jan 16, 2024----
PinnedBüşra GültekinDetection of Port Scan Attacks: How to use Nmap to scan open ports?Hi security people!7 min read·Dec 25, 2023----
PinnedBüşra GültekinIntroduction to Network Security: TCP 3-Way Handshake, Http Protocol, Observing Network Traffic by…Hello everyone. I bet you missed my articles. Don’t worry I am still here and I will be. 🙂 In this article, I will talk about a few…13 min read·Jan 2, 2024----
Büşra GültekinCommon Topics in Network: Proxy Server, Authentication & Authorization, Front-end & Back-endThe proxy is the drawbridge at the entrance of the castle, providing security and protection against threats like DDoS attacks and more…6 min read·Jan 8, 2024----
Büşra GültekinTask 1.1: How to install Kali-Linux on VMWare Fusion?How to install Kali-Linux on macOS devices?8 min read·Dec 5, 2023----