Read More

Java Decompilers

I agree that working at byte code level is sometimes a bit challenging. If the mission is analyzing a Java malware, decompiling the class files into Java source code is the first step most analysts would take. However, like I mentioned in my post on July (Java Byte Code Debugging),…
Read More
Read More

RF World and Security

Since I was a child, remote-controlled garage doors have always caught my attention. As I grew older and progressed in my profession, I decided to turn my curiosity into practice and examine these systems that communicate with RF from the perspective of a security researcher. I began to ask myself…
Read More
Read More

Bad USB

Every year, in August, at the end of the traditional Black Hat Cybersecurity Conference held in Las Vegas, USA, two researchers, Karsten NOHL and Jakob LELL, signed a striking presentation called BadUSB. In this presentation, in short, it was provided that the hardware software (firmware) used by the microcontroller in…
Read More
Read More

Manipulated Photo Analysis

As a citizen who followed the Gezi Parki protests that marked the past month through written, visual, and internet media, my interest was drawn to various photos that caused frequent debates among the public and parties involved, in addition to the events. While one side blamed the other side through…
Read More
Read More

I Love Python :)

I, like many ethical hackers, have been busy with the C programming language for years, have examined a lot of source code, have written many programs, and have often thought, “I’m glad I learned C programming language” because whenever I look at source code written in another programming language, I…
Read More
Read More

CEH or OSCP ?

In the early 2000s, I had decided to take the CEH training from EC-Council at an educational institution in Altunizade, and I had high expectations for this course. Normally, this training, which is given in 5 days abroad, was turned into a 3-month course, if I remember correctly. I thought…
Read More