Onurcan GençinSystem WeaknessThe Role of Leaked Data in Web Application Penetration Testing StrategiesHi everyone ! Today I would like to emphasize on the importance of the leaked credentials on web application penetration tests. Although I…1d ago1d ago
Onurcan GençinSystem WeaknessWgel WriteUp | Wget Exploitation & Sensitive File ExposureLearn how to use the allowed binary wget to forward POST requests through your netcat listener & web application fuzzing.Nov 10Nov 10
Onurcan GençinSystem WeaknessA Real-World Web Application Penetration Testing Story: Detecting and Evading Rate Limits for OTP…Real-World penetration testing approaches towards live servers with complex mechanisms.Nov 5Nov 5
Onurcan GençinSystem WeaknessThompson WriteUp | Manual & Automated ExploitationIn this article, I provided different ways for manual & automated exploitation that is often significant, especially for well-known exams.Nov 4Nov 4
Onurcan GençinT3CHEasy PeasyLearn deep-dive reconnaissance, reverse shell through customized cron script and hash bruteforcing via pre-defined list.Nov 3Nov 3
Onurcan GençinSystem WeaknessBrooklyn99 WriteUp | Steganography & Binary ExploitationLearn how to perform steganography bruteforce and binary exploitation through TryHackMe’s easy level challenge :)Nov 1Nov 1
Onurcan GençinT3CHA Real-World Web Application Penetration Testing Story: Client-Side Time-Based CAPTCHA BypassAs penetration testers, we encounter with a variety of platforms, architectures, network structures and software developer designs in our…Oct 30Oct 30
Onurcan GençCOMD358: Lessons from Boeing’s 737 Max CrisisAn homework assignment for the COMD358 course at Bilkent University.Oct 27Oct 27
Onurcan GençinSystem WeaknessFowsniff WriteUp | POP3 Bruteforce, Writable ScriptOSINT, Telnet usage, manual OS enumeration, privilege escalation via writeable script, linpeas usage and so on.Oct 17Oct 17
Onurcan GençinT3CHLianyu WriteUp | Binary Exploitation & Security MisconfigurationLearn how to make deep fuzzing including dirsearch, Gobuster, FTP client usage and privilege escalation through binary called pkexec.Oct 12Oct 12