Real Life Pentest Scenarios #1 – Shortest Way To Domain Admin

Real Life Pentest Scenarios #1 – Shortest Way To Domain Admin

SercanSayitogluApr 22, 20214 min read

I would like to share an incident that I encountered years ago, in a penetration testing project which can give a very good idea about how inconsistent the security maturity and self-confidence of institutions can be. I would also like…

Hacking With Automation

Hacking With Automation

SercanSayitogluFeb 8, 20215 min read

Creating a smart scanner and hacking even the biggest organizations without touching the keyboard? So easy! Sia Back in 2018, I decided to create a simple program to do the basic enumeration. Because, while pentesting with a big scope, these…

Botnets, Threat Actors and Honeypots

Botnets, Threat Actors and Honeypots

SercanSayitogluJan 24, 202110 min read

Botnet is a term derived from the words “robot” and “network”. It can be defined as the network (s) controlled (by a person or a group) of devices that have been (albeit partially) compromised by malware. Generally, malware does not…

What is Red Team?

What is Red Team?

SercanSayitogluNov 22, 20204 min read

In this article, we will talk about one of the most popular concepts of cyber security, “Red Team”. But before that, we need to know what is penetration testing and why we need penetration tests. Penetration testing Penetration testing is…

What is ‘Hacking’?

What is ‘Hacking’?

SercanSayitogluNov 22, 20205 min read

First of all, we have to realize that the word ‘hacker’ has nothing to do with piracy or theft. The unauthorized use of a right by a person is called piracy, and the taking of a property without the right…