Kategori: Genel
-
Counter Custody and Lock Breaching

In this article we will examine how-to’s, starting with the concepts of counter-custody and lock breaching. The techniques in this article apply to extremely simple, generally known, low security/threats. It is written to raise awareness of individual defense and to draw attention to entry-level physical security factors for security researchers. Do not try in situations…
-
What are Attacksuit and Hashtab plugins? And as a cyber security professional, why haven’t you used them so far?

The title of such articles is usually “why should you use it?”, but once you get to know this plugin, as a cyberist, it will make your hand go straight to the “install” button. To sweeten up what I think is a very short article, I consulted a mutual friend, You-Know-Who , who has added…
-
To Complicate or Not to Complicate. — What is Fuzzy Hash?

I was inspired to write this article when I came across TryHackMe’s Pyramid of Pain room (mentioned under tools heading). I thought hashes were a very good technology in their use cases, but the fact that the slightest change would produce a completely different result always made me feel like there was something missing. As if there…
