Real Life Pentest Scenarios #1 – Shortest Way To Domain Admin
I would like to share an incident that I encountered years ago, in a penetration testing project which can give a very good idea about how inconsistent the security maturity and self-confidence of institutions can be. I would also like…
Hacking With Automation
Creating a smart scanner and hacking even the biggest organizations without touching the keyboard? So easy! Sia Back in 2018, I decided to create a simple program to do the basic enumeration. Because, while pentesting with a big scope, these…
Botnets, Threat Actors and Honeypots
Botnet is a term derived from the words “robot” and “network”. It can be defined as the network (s) controlled (by a person or a group) of devices that have been (albeit partially) compromised by malware. Generally, malware does not…
What is Red Team?
In this article, we will talk about one of the most popular concepts of cyber security, “Red Team”. But before that, we need to know what is penetration testing and why we need penetration tests. Penetration testing Penetration testing is…
What is ‘Hacking’?
First of all, we have to realize that the word ‘hacker’ has nothing to do with piracy or theft. The unauthorized use of a right by a person is called piracy, and the taking of a property without the right…