Posts
Cihat Yildiz
Cancel

Reversing Challenge - Hack The Box - Impossible Password

In this blog post, we will see the solution of a Hack-The-Box reversing challenge called “Impossible Password”. Its been a long time solving some reversing puzzles :) Let’s check the binary first....

Writeup - Hack The Box - Brainfuck

In this post, I will show how I resolve the machine called Brainfuck. The difficulty of this macihne is hard. Port and Service Discovery Lets start with a basic nmap scan root@kali:/home/kali#...

Writeup - Hack The Box - Lame

In this post, I will show how I resolve the machine called LAME. The difficulty of this macihne is easy. This is my first post about the hack the box machines. I will write more writeups about HTB ...

Nexpose Vulnerability Scan by Using Rest-API

Vulnerability scan tools you identify vulnerabilities in your infrastructure. You can perform manual and automated scans. But, in some cases, you may need to integrate your scannner with another to...

A Cheatsheet for Docker

if you are using Docker in your local or remote ennvironment, sometimes you might have trouble to manage Docker images and containers. I want to share a small cheatsheet that I used. I think this i...

Simple API for Secret Scanning

Secret scanning is an essential process before application deployment. You need to check any information left in the code, such as password, keys, etc. There are many tools to identify secrets. Whi...

Useful SQL Queries for Nexpose

Nexpose has lots of features to generate reports. But in some cases, the features in the UI may not be useful for you. You may need to create custom reports for your vulnerability management proces...

Database Security Notes

Database security is the relevant topic that has been in discussion on security personnel. The increasing number of incidents dictates that it should be noticed immediately. Database security shoul...

Notes About Improving Technical Writing

We read and write a number of documents related to different topics every day. And, sometimes we want to create a better structure in our technical documents. Sometimes, we want to use better struc...

Some Reverse Engineering Tools

Reverse engineering is analyzing an object, system or application to see how it works in order to understand the design and the behavior. If you are in the cybersecurity domain, you may use several...