Captainyarimca kullanıcısının son içeriği

  1. Captainyarimca

    What is Software? What Are The Types Of Software?

    What is Software? What are the Software Types? In Which Areas Is The Software Used? The software process is the compilation of commands given to electronic devices and making them into a whole. If electronic devices are commanded with software, time is saved, as well as workload and...
  2. Captainyarimca

    What Is Clickjacking Attack? How To Do It

    Hello, I want to show you what "clickjacking attack" is and how it is done. First of all, what is "Clickjacking"? Clickjacking attack is the process of feeding the screen code to the victim after clicking on a specially placed code set (for example: free download, crack download sites ... etc)...
  3. Captainyarimca

    Simple Malware Analysis

    In this topic, I will tell you how Malware Analysis is done, what types of analysis are, what it is for, which programs are used.You will have information about how to perform malware analysis and which methods to examine. First of all, I would like to mention that the methods I describe here...
  4. Captainyarimca

    Pentest Methodologies

    Introduce There are a number of standards when performing penetration tests. These standards are used to make penetration tests easier, more practical and more useful. The general name of these standards is Pentest Methodologies. What is Penetration Testing (Pentest) Methodology? The...
  5. Captainyarimca

    What is Signal OWL?

    Introduction SIGINT (signal intelligence) has become of great importance in the world. Countries have definitely created a SIGINT team for their intelligence services. As technology advances rapidly, we have come to a time when normal people can do signal intelligence. The equipment I will tell...
  6. Captainyarimca

    SSRF vulnerability and exploitation

    Today I will show you how to exploit SSRF (Server Side Request Forgery) vulnerability. Let's go to https://portswigger.net/web-security/ssrf and find out what ssrf is. I skip these places directly and go to the solution. First, let's go to https://portswigger.net/web-security...inst-localhost...
  7. Captainyarimca

    Password and File Stealing Automatically with Usb

    Necessary programs and hardware: Any flash memory (usb) USB stealer.exe Webrowser.exe and usb accelerator.exe that I quoted from a site called korkusuz yazar Don't worry, ALL IN DOWNLOAD LINK Not advertising The download link that I will explain step by step is below. No Rar Pass Step 1...
  8. Captainyarimca

    Hacking Users That Connected to Wifi ANDROID // Dsploit

    Checking Wifi Network With Android Device // Dsploit Friends, I will introduce you to the Wifi Hack Program. First of all, the device must have ROOT. Otherwise, the program does not work. The program is running. Its coding is based on Linux. You can work on the wi-fi you are connected to. For...
  9. Captainyarimca

    What is the purpose of the usb port in modems

    Hello friends, if you are wondering what the USB port in modems is good for, you are in the right place. USB port in modems has 3 purposes. 1- You can use it as an FTP server on your home network If you want to install a memory and use it as ftp, you need to connect to your modem interface...
  10. Captainyarimca

    USING MATLAB and MATRIX OPERATIONS

    The "Matlab" program (named after the first three letters of the MATrix LABoratory) is a matrix and math-based complex program in which most of the engineering applications, calculations and simulations are performed.Since all kinds of graphical results can be obtained in the desired style, its...
  11. Captainyarimca

    Windows Server Management

    Windows Server Management Topics; Computer Networks What is Network? Why we Use Computer Networks? Wireless Networks COMPUTER NETWORKS The connection of two or more computers to each other is called a computer network.While a connection can be established between only four computers with the...
  12. Captainyarimca

    Command Prompt (cmd) Commands and Their Usage

    Command Prompt (cmd) Commands and Their Usage Hello, In this topic, I will talk about cmd commands and what they do. The terminal is cooler, but you can also run commands you know in PowerShell. Now is the time to examine Windows system commands. .386=vxdfile .3g2=WMP11.AssocFile.3G2...
  13. Captainyarimca

    DNS Spoofing Attack

    The Domain Name System (DNS) is a service used to resolve the Domain Name information that people can read and keep in mind, to IP addresses that machines can understand. DNS (Domain Name System), the service used to resolve the IP address that machines understand. In other words, we can call...
  14. Captainyarimca

    Shell / Backdoor - Detection & Security // Web Script Club

    WordPress is by far the most popular Content Management System (CMS). This popularity is mainly due to the excellent customization offered by themes and extensions. Shell A shell can be written in any language supported by the target web server. Most common shells are written in widely...
  15. Captainyarimca

    Social Media's Contribution to SEO

    Hello TurkHackTeam Members. In this topic, I will talk about the Contribution of Social Media to SEO. Subjects: How Does Social Media Contribute to SEO? Social Media Increases Brand Awareness Proper Social Media Management Increases Reliability Original Contents are Valuable in Every Media...
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.