Open in app

Sign In

Write

Sign In

Kemalfurkanaraci
Kemalfurkanaraci

31 Followers

Home

About

Oct 14, 2022

Shellcode Analyze

What is shellcode? Shellcode is a set of instructions executed by the CPU at run time. It is commonly written in machine code. How we will generate a shellcode, Let’s write a small C program printing “Hello Word” to the screen. #shellcode. c #include <stdio.h> void main() { printf(“Hello World!”); } gcc…

Cybersecurity

4 min read

Shellcode Analyze
Shellcode Analyze
Cybersecurity

4 min read


Apr 4, 2022

AS-REP Roasting

AS-REP Roasting is an attack against Kerberos for user accounts that do not have pre-authentication. Let’s continue… Enumerating Users via Kerberos The Kerberos Authentication is one of the most using authentication protocols that Domain Controller uses all time. …

Domain Security

3 min read

AS-REP Roasting
AS-REP Roasting
Domain Security

3 min read


Mar 9, 2022

Bypassing File Upload Restriction with Magic Numbers

Before taking that magic number into the game, there are a few things we need to know about Magic numbers. What are Magic Numbers? Magic numbers are used to identify a file format or protocol. The term magic number is represented by constant numerical or text value. …

Web Security

3 min read

Bypassing File Upload Restriction with Magic Numbers
Bypassing File Upload Restriction with Magic Numbers
Web Security

3 min read


Feb 26, 2022

What is XXE vulnerability?

Before jumping into the XXE attack , We should know the basics of what is XML and the usage of XML. What is XML used for? XML stands for an extensible markup language. It is used to store and transfer data between two points. (Client and Web Server) There are some similar points between HTML…

Web Application Security

3 min read

What is XXE vulnerability?
What is XXE vulnerability?
Web Application Security

3 min read

Kemalfurkanaraci

Kemalfurkanaraci

31 Followers

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech