Profile cover photo
Profile photo
Eray Alparslan
1 follower
1 follower
About
Posts

Post has attachment
Under Construction
My previous works will be placed below soon... (I believe so) Contact: goahead.eray@gmail.com
Add a comment...

Post has attachment
Steganography Example In Windows
Google states steganography as   " the practice of concealing messages or information within other non-secret text or data." That's exactly what we are gonna do in this post.  There are many steganography tools on the internet but we can simply do it also w...
Add a comment...

Post has attachment
Web Application | General Knowledge
Let's dive into the web application a bit.  There are thousands of attacks everyday through web applications and some of them really damage a lot. I don't wanna bother you much by talking about why web-security is very important and blablabla but I need to ...
Add a comment...

Post has attachment
Web Application | General Knowledge
Let's dive into the web application a bit.  There are thousands of attacks everyday through web applications and some of them really damage a lot. I don't wanna bother you much by talking about why web-security is very important and blablabla but I need to ...
Add a comment...

Post has attachment
Finding Security Vulnerabilities | VLC Stack Buffer Overflow
"What makes you vulnerable makes you beautiful"  saying was not told to us. However, there is no harm in finding the beauty of others :) In this post I will be covering vulnerability assessment. This approach is specially for VLC 0.9.44 but I believe that i...
Add a comment...

Post has attachment
Finding Security Vulnerabilities | VLC Stack Buffer Overflow
"What makes you vulnerable makes you beautiful"  saying was not told to us. However, there is no harm in finding the beauty of others :) In this post I will be covering vulnerability assessment. This approach is specially for VLC 0.9.44 but I believe that i...
Add a comment...

Post has attachment
Finding Security Vulnurebilities | EIP = 41414141
Hey folks! Let's talk about EIP. This dude stands for Extended Instruction Pointer and it's basic duty is to point the next instruction. So if we tamper this register we can actually change the flow of the software. Smart enough? :) Like I said, Instruction...
Add a comment...

Post has attachment
Finding Security Vulnuerabilities | Disassemblers
Disassemblers    Let's say we don't have the source code. What do we do? Do we say " I'm not playing because I don't have the code :( "  No! That is the thing an amateur lazy wannabe hacker would do. So what?  We have disassemblers my friend... They are awe...
Add a comment...

Post has attachment
Finding Security Vulnuerabilites | General Knowledge
When it comes to finding security holes, generally, we can talk about 2 common approach. Reading all code way down is not something we can consider as “practical”. However, instead of doing such a crazy unpractical thing we’d better force ourselves to reall...
Add a comment...

Post has attachment
Annoying uncolored bash terminal?
When I made a dist-upgrade, I don't know but my terminal turned into fucking white color. It annoyed me so much because I couldn't be able to see the must emphasized words. I didn't understand whether or not I'm looking at a directory or file w/o doing ls -...
Add a comment...
Wait while more posts are being loaded