Articles By This Author

Live Cyber Attack Map

The aim of this project is to experience various cloud technologies and combine these technologies with cyber security. The system works as follows. We are creating a vulnerable virtual machine on Azure, this machine will be our honeypot. Thanks to the python script I wrote, we collect the logs of the attacks (only RDP) on […]

Read More

What is SQL Injections?

SQL injection (SQLi) is an attack technique used to attack database-driven applications; where the attacker takes advantage of SQL language features and adds new SQL statements to the corresponding field on the standard application screen. (For example, an attacker could import database contents to himself). SQL injection takes advantage of a vulnerability in the software […]

Read More

Log4J Vulnerability CVE-2021-44228 (Log4Shell)

The vulnerability, published with the Remote Code Execution (RCE) code CVE-2021-44228, allows malicious people to bypass systems with Apache Log4j. We will talk about it in this article. What is Log4J ? Log4j is a java based logging library developed by Apache Software Foundation.Used by Java programmers. Log4j makes level-based logging on demand and is […]

Read More

TryHackMe Mr. Robot CTF Walkthrough

Based on the Mr. Robot show, can you root this box? Before I begin, I must say I would like to thank Leon Johnson for creating this beautiful CTF. Enumeration To start with, let’s run nmap to view the open ports. As you can see, there are 3 open ports, these are 23,80,443 ports. Apache […]

Read More

Buffer Overflow with VulnServer for Beginners

What is a Buffer Overflow Buffer Overflow occurs when a program tries to store more data in temporary storage than it can hold. Writing outside of the allocated memory space can corrupt data and crash the program. Buffer overflow can be found in web applications that serve static and dynamic expression.Attackers use buffer overflow to […]

Read More

Reverse Shell And Bind Shell

In this article, we will talk about Reverse shell and bind shell. Below you can see the differences between reverse shell and bind shell and how we can create them. Reverse Shell Reverse Shell is a shell session established on a connection initiated from a remote machine, not from the local host. Attackers who successfully […]

Read More