What is Searchsploit and Its Use
One of our essentials in penetration tests is of course searchsploit. He presents the exploits in ExploitDB to us from the terminal and also provides …
Knowledge pool for Information Technologies
One of our essentials in penetration tests is of course searchsploit. He presents the exploits in ExploitDB to us from the terminal and also provides …
The scalpel is one of the nice tools that can be used for recovering files that have been deleted from the system for one reason …
The process of bringing back data that has become inaccessible, deleted, corrupted or lost in any way and cannot be reached by normal methods is …
We will explain the “uname” command that you can use on your Linux operating system. With this command, you can get the kernel information and …
It is a free platform developed in Python and Ruby languages that allows servers under your Ansible management to do everything you want under one …
Some scenarios in DLP POC processes are as follows. These are the scenarios that come to my mind. You can further expand these scenarios. Protection …
We install the Ansible open source automation tool on CentOS 8. Ansible Installation Let’s run the CentOS operating system repository update commands. sudo yum -y …
As of 24th of October 2019, Centos 8 was launched with many new features. We can call it a non-commercial clone with the same characteristics …
The UNIX operating system, which was developed at the AT & T Bell Labs in the late 1960s, was adopted by certain organizations throughout time …