KernelBlog

Touch The Technology

Melisa Ayşe Demirel

Network Analysis: Ngrep

What is ngrep? You may want to do network analysis for many reasons. This may be during or after an attack or just out of pure curiosity. That’s why there’s some tools to help you analyze your network easier. Ngrep…

Penetration Test Steps

Hello everyone! Today I’ll talk about the steps to penetration testing. I hope you’ll enjoy it! First of all, let’s talk about what a penetration test is. It is, in short, called “Pentesting”. Pentesting is to report the bugs, vulnerabilites…

Passive Data Collecting: Shodan

Data collecting is the first step of pentesting. The more data you have, easier and faster it is to be successful. Passive data collecting is collecting data about your target without directly contacting your target. Which means, from the internet….

Developing Apps Without Coding Knowledge

Maybe it’s not as hard as you think it is to make apps for Android devices. Because I’ll now talk about an app that you most likely haven’t seen or paid attention to. This apps helps you code using blocks….

Unity 3D Android SDK Setup

In this article we’ll show you how to setup android SDK used to make android/mobile games. Download Android Studio. After the download is finished, open the file and you should see a window like below: Just like you see in…

Raspberry Pi – Raspbian Setup

Hello, today I will show you how to setup Raspbian. Steps First, you’ll have to download raspian (RASPBIAN STRETCH WITH DESKTOP). Second, you should download Win32 Disk Imager to write Raspbian to an SD Card. We needs this program to…

Possible Cyber Attack Scenario: Data Collecting

Hello readers! If you want to know how to cyber attack other devices, the information for it is on the internet messily. The purpose of this article is to teach you the steps and scenarios of an attack systematically. First…

Quantum Levitation

Roughly defining, it’s levitating a superconductive object within a magnetic surface using the features of quantum physics. How Does It Levitate? When a superconductive object is placed on a magnetic disc, the strong magnetic surface of the disk causes the…

Uninstalling Linux

This article is about uninstalling Linux distrubutions from a computer with two operating systems (dualboot) without damaging the machine. Operations First of all, you should start your Windows OS Download the software called MbrFix.exe to the C:\ directory Start Windows…

21 TCP | FTP PORT ABUSE

Hello dear readers, first of all, I’d like to give you some information about 21 TCP | FTP Protocol today. 21st Port is a protocol that does the file transfers and all the other input and outputs on the web…