Articles By This Author
Live Cyber Attack Map
The aim of this project is to experience various cloud technologies and combine these technologies with cyber security. The system works as follows. We are creating a vulnerable virtual machine on Azure, this machine will be our honeypot. Thanks to the python script I wrote, we collect the logs of the attacks (only RDP) on […]
What is SQL Injections?
SQL injection (SQLi) is an attack technique used to attack database-driven applications; where the attacker takes advantage of SQL language features and adds new SQL statements to the corresponding field on the standard application screen. (For example, an attacker could import database contents to himself). SQL injection takes advantage of a vulnerability in the software […]
Log4J Vulnerability CVE-2021-44228 (Log4Shell)
The vulnerability, published with the Remote Code Execution (RCE) code CVE-2021-44228, allows malicious people to bypass systems with Apache Log4j. We will talk about it in this article. What is Log4J ? Log4j is a java based logging library developed by Apache Software Foundation.Used by Java programmers. Log4j makes level-based logging on demand and is […]
TryHackMe Mr. Robot CTF Walkthrough
Based on the Mr. Robot show, can you root this box? Before I begin, I must say I would like to thank Leon Johnson for creating this beautiful CTF. Enumeration To start with, let’s run nmap to view the open ports. As you can see, there are 3 open ports, these are 23,80,443 ports. Apache […]
Buffer Overflow with VulnServer for Beginners
What is a Buffer Overflow Buffer Overflow occurs when a program tries to store more data in temporary storage than it can hold. Writing outside of the allocated memory space can corrupt data and crash the program. Buffer overflow can be found in web applications that serve static and dynamic expression.Attackers use buffer overflow to […]
Reverse Shell And Bind Shell
In this article, we will talk about Reverse shell and bind shell. Below you can see the differences between reverse shell and bind shell and how we can create them. Reverse Shell Reverse Shell is a shell session established on a connection initiated from a remote machine, not from the local host. Attackers who successfully […]