Hande Göncer KayaAutomating PuTTY Logs with TimestampsWhen working with remote sessions, logging output is often essential for auditing, troubleshooting, and record-keeping. However, manually…5d ago5d ago
Hande Göncer KayaDiscovering vulnerabilities quickly with targeted scanning lab + Exploiting XInclude to retrieve…In this lab, /etc/passwd contents need to be retrieved in 10 minutes.May 13May 13
Hande Göncer KayaExploiting a mass assignment vulnerability by PortsAfter logging in with wiener:peter, start capturing the request in the checkout part.There are two ; GET and POST for /api/checkoutDec 27, 2023Dec 27, 2023
Hande Göncer KayaFinding and exploiting an unused API endpoint by PortswiggerWhen the leather Jacket is chosen, in the HTTP history tab, it is seen /api/products/1/price and send the request to the Burp repeater.Dec 22, 2023Dec 22, 2023
Hande Göncer KayaExploiting server-side parameter pollution in a query string by Portswigger Web AcademyAPIs (Application Programming Interfaces) have become the backbone of modern software development, facilitating seamless communication…Dec 12, 2023Dec 12, 2023
Hande Göncer KayainNettsi Bilişim Teknoloji A.Ş.NETCAT ve NCAT kullanımıBu yazı dizimizde Linux komutlarından NETCAT ve NCAT kullanımını birlikte inceleyeceğiz.Jan 29, 2021Jan 29, 2021