What is a Firewall? How It Protects Network Systems
Sunday, September 22, 2024 in Cybersecurity
Categories:
In today’s digital landscape, the importance of network security cannot be overstated. As organizations and individuals increasingly rely on the internet for communication, transactions, and data storage, the threat of cyberattacks has become a …
What is SMB from a Cybersecurity Perspective?
Sunday, September 22, 2024 in Cybersecurity
Categories:
Server Message Block (SMB) is a network file-sharing protocol that allows applications and users to access files, printers, and other network resources across a network. While SMB plays a crucial role in file sharing and resource access, it has also …
Roadmap to Becoming a Penetration Tester (Pen Tester)
Friday, September 20, 2024 in Cybersecurity
Categories:
In today’s digital age, cybersecurity has become more crucial than ever before. With organizations facing a constant barrage of cyber threats, the need for skilled professionals to test and secure systems has skyrocketed. One such role is that of a …
Information Gathering Procedures -2- Target Selection
Sunday, April 24, 2016 in Cybersecurity
Categories:
We have started the Information Gathering process, which is the 2nd Phase of Penetration Testing, with our article found at this link. We will try to explain the Target Selection title, which is one of the main topics we mentioned in that article. …
Cyberspace Definition and Actors
Wednesday, April 20, 2016 in Cybersecurity
Categories:
Technology and interconnected systems, which continue to become indispensable in every area of our lives, have caused a new concept to emerge in human history. Concepts that are used with the prefix cyber are used to express the technological …
Penetration Test Phases (Coordination -3)
Wednesday, April 20, 2016 in Cybersecurity
Categories:
Our articles explaining Penetration Testing processes continue. In this study, we will explain the targets to be discussed in the Coordination article, which is the 1st Phase of the Penetration Testing Phases . As you know, the first part of the …
Penetration Testing Phases (Coordination – 2)
Monday, April 18, 2016 in Cybersecurity
Categories:
We have examined the general structure of the coordination processes, which is the 1st Phase during the Penetration Test preparations, in our article in this link. Now, we will examine in detail one of the issues that will be discussed during the …
Penetration Test Phases (Coordination -1)
Sunday, April 17, 2016 in Cybersecurity
Categories:
What are the Penetration Testing Phases? In our article titled ( see ), we examined the general definition and content of the phases. In this article, we will look at Phase 1, Coordination, in detail. In these articles we have prepared, we intend to …
Information Gathering Procedures -1- Basic Approach
Saturday, April 16, 2016 in Cybersecurity
Categories:
From this article, we are starting the 2nd Phase of Penetration Testing, Information Gathering processes and their details. We will follow the path of explaining the topics listed below in separate articles. You can review the general stages in this …
What are the Penetration Testing Phases?
Saturday, April 16, 2016 in Cybersecurity
Categories:
Tests performed to determine the current status of the information system used and the precautions to be taken are called Penetration Tests. The process referred to as Penetration Testing consists of 7 stages. Although Penetration Test Phases are …