What is Gophish? Gophish Installation and Scenario
Before we start with Gophish, we will explain what Phishing is. What is Phishing? It is a type of online attack in which fraudsters send …
Knowledge pool for Information Technologies
Before we start with Gophish, we will explain what Phishing is. What is Phishing? It is a type of online attack in which fraudsters send …
DEP (Data Execution Prevention) is a security feature that comes with Windows XP SP2. It prevents some unauthorized codes from running on certain memory sections …
Cross-Site Scripting (XSS) is a weakness that occurs if the developer does not pass the input from the user through the required HTML and JavaScript …
DVWA(Damn Vulnerable Web Application), For pentesters and web security users who want to improve themselves in the field of web application security. It is an …
Source code analysis(SCA) is the automatic testing of a program’s source code to find and fix errors before the application is sold or distributed. It …
When I wanted to work with the Wireshark program that is ready for quality, I encountered an error like the following on my screen. Let’s …
In our first image, we see compatibility_level as 140, which came in 2017. This can be confusing for “downgrade” operation. Changing this from 120 “compatibility_level” …
It is a free platform developed in Python and Ruby languages that allows servers under your Ansible management to do everything you want under one …
Oracle VirtualBox is a successful virtualization application. After installing this application on your computer, you can install as many different operating systems as you want …
VirtualBox is virtualization software for x86 / x64 architectures created by German Innotek GmbH. Developed by Oracle Corporation. With this application, it is possible to …