Index
Expand All
Collapse All
-
CyberSecurity
-
The Hacker Methodology
Methodology Outline
-
Offensive Security
Intro to Offensive Security
Offensive Pentesting
-
cheat-sheets
bash script
nmap
-
Attacks
Metasploit
Evil Twin
SQL Injection
SQL Injection-2
SQL Map
DNS Manipulation
Deauthentication Attack
Fake Auth
WPA/WPA2 Ağlara Atak
ArpSpoof
man in the middle saldırısı
https downgrade
ettercap
Reverse Shell
-
form attacks
submit form
upload form (weevely)
XSS
Bruteforce & Dictionary Attacks
yetki yükseltme
-
Recon
Introductory Researching
Google Dorking
Passive Recon
Active Recon
enumeration
ZAP
goBuster
dirb framework
netdiscover
sudomy
subdomain
robots.txt
YouGetSignal (reverse ip)
nmap
general resources
webpage debug
-
Local Network Attacks
WPA Enterprise
-
Outside Network Attacks
Outside Network Attacks
Ngrok
-
PenTest
-
webPenTest
Web Application Security
Burp Suite
contentdDiscovery
file inclusion
dirsearch
Black, White, Grey Box
CIA Triad (CIA Üçlüsü)
PA (Privileged Access)
Threat Modelling Frameworks & Incident Response
-
exploit
bufferoverflow
ARP
netcad
-
Hash
hashcat
-
Linux
Bash Scripting
Package Management
Processes 101
Logs
Downloading Files
Common Directories
cron
Operators
-
Commands
uniq
arp
tree
chmod
search
find
grep
ls
tmux
Hata Çözümleri
Kernel (Çekirdek)
-
Network
Introductory Networking
DNS
LAN
Subnet
ARP
Modem Oluşturma
IP address
MAC
NAT
Ports
subnetmask
Network Protocol
TCP & UDP
OSI Model
host
connection-oriented & connectionless
PDU
SMB
FTP
redis
captive portal
WEP Çalışma Mantığı
Ağ Güvenliği
-
Programlama
iç içe if ile elif farkı
Bash
Compiler vs Interpreter
-
Python
-
print()
sep (separate)
end
file
flush
* parameter
Kaçış Dizileri
swap
formatted string
args (arbitrary arguments)
keywords argument
map, filter, lambda
scope
decorators
class & methods
inheritance
polymorphism
special (dunder) methods
try, except, finally
library & modules import
create and use own modules
interactive shell
// operator
-
library
subprocess & optparse
show library modules
-
usefull resources
websites