Zer0Day Attacks

A zero-day vulnerability is a software flaw that is not recognized or detected until exploited by a developer or vendor. They are often difficult to detect until the attacks occur. Attacks happen by abusing this vulnerability and spreading malware without allowing developers to release a patch or fix. If a software contains a security flaw,[…]

Information Security

Information Security is defined as the protection of information, as an asset, from unauthorized access, use, alteration, disclosure, modification, destruction, and disruption. It consists of three basic elements; Confidentiality: Protecting information from being accessed by unauthorized parties. Integrity: Preventing data from being modified in an unauthorized or undetected manner. Accessibility: Data, software, and hardware are[…]

Protecting Your WordPress Website

Hello, in this article I will talk about protecting your wordpress website. Let’s get into it without further ado. Keeping WordPress Updated The updating doesn’t just end with updating WordPress, you have to keep updated in every way. As example, let’s say in one of the communication forms’ 1.12.20 release there used to be a[…]

XSS Vulnerability: Exploitation and Preventation

In this article, we will talk about a web security vulnerability called XSS and it’s reasons, how to exploit it as well as how to prevent it. XSS (Cross Site Scripting) Vulnerability lets the attacker run javascript codes on the website using the input areas on it. The reason why this vulnerability appears is because[…]

Penetration Test Steps

Hello everyone! Today I’ll talk about the steps to penetration testing. I hope you’ll enjoy it! First of all, let’s talk about what a penetration test is. It is, in short, called “Pentesting”. Pentesting is to report the bugs, vulnerabilites that can affect a website and to protect a website from possible hacker attacks.These websites[…]

Passive Data Collecting: Shodan

Data collecting is the first step of pentesting. The more data you have, easier and faster it is to be successful. Passive data collecting is collecting data about your target without directly contacting your target. Which means, from the internet. There’s lots of tools and methods to collect data about a target though Shodan has[…]