- Cyber Security Conferences - Ayşenur Burak
- WiPi Hunter Detecting - Besim Altınok
- Web Application Firewall (WAF) Bypassing Methods - Ulaş Fırat Özdemir
- Taking Control of Admin Account on Active Directory using the DCC - Girayhan Menekay
- Dynamic Host Configuration to Root - Barkın Kılıç
- Offensive Touch to Defensive World - Halil Dalabasmaz
- Simone Margaritelli Interview - Utku Şen
- Denial of Service - Bener Kaya
- A Young Hacker in the Corridors of a Holding at Midnight - Yusuf Şahin
- Revolutionary Blockchain Technology - Mustafa Yalçın
- How I hacked into a college’s website! - Aditya Anand
- Meltdown, Spectre and Foreshadow - Chris Stephenson
- The Dangers of Wireless Networks - Besim Altınok
Read Free #StayHome
The cybersecurity sector borrows many terms from the military jargon because believe it or not, this is an ongoing war. Sometimes the atmosphere is more mischievous than the Cold War, and sometimes it’s far more hot and effective than the battlefield.
One of the commonly used terminologies adapted from the war zone to cybersecurity was the Red Team concept. In military strategies, Red Team methodology stands for pretending to be the hostile forces to model out the worst scenario and measure the durability of the friendly forces.
The attackers are always a step ahead. So Red Teaming allows the course of the battle to have a drastic change. Just like the microbes vaccinated into the body to defend against illnesses, thinking like the enemy helps build a stronger defense.
This is why the concept of Red Team has been very popular in the past few years in cybersecurity. Instead of playing devil’s advocate, you have to think like the devil to discover the most evil plans and test them on the system.
Sun Tzu wrote about giving the utmost importance to knowing your enemy in his ageless work The Art of War.
Socrates shared his valuable wisdom on knowing your enemy:
“Speak, So That I May See You.”
In the second issue of Arka Kapı Magazine, we will take a closer look at Red Team methods:
The tool crafted by Besim Altınok WiPi Hunter will help you discover the malicious WiFi networks surrounding you.
Do the security devices and software you invested a fortune in do their job properly? You sure? The WAF Bypassing Methods written by
Ulaş Fırat Özdemir will question the integrity of your security.
Active Directory is a widely used software in the computer networks.
Girayhan Menekay wrote about taking over the admin account using Domain Cached Credentials.
Barkın Kılıç wrote a detailed article on the DynoRoot vulnerability that affects Redhat based Linux distributions with a tweet-long of exploit code.
Halil Dalabasmaz gives a sneak peak of how you can bypass security measures like anti malware using his own tool SpookFlare on his article “An Offensive Touch to the Defensive World.”
Many other unique articles are waiting for you in the second issue of Arka Kapı Magazine.
Special thanks to Netsparker Ltd. for sponsoring our second issue