S脹zma Testi ve G端venlik Uygulamalar脹 El Kitab脹 - Furkan Enes PolatoluFurkan Enes Polatoglu
油
Bu el kitab脹n脹 CEH i巽eriine uygun olarak mod端ler bir yap脹da haz脹rlamaya 巽al脹t脹m. El kitab脹, daha 巽ok bir sald脹r脹 klavuzu olarak nitelendirilebilir. Penetrasyon testi s脹ras脹nda hangi ilemleri, hangi s脹rayla ve nas脹l uyguluyoruz? sorular脹n脹 ortadan kald脹rmak ve kar脹脹kl脹klar脹 gidermek ad脹na, ad脹m ad脹m
haz脹rlanm脹 bir rehber ortaya koymaya 巽al脹t脹m. Okunduunda, rehberde ele al脹nan bal脹klar hakk脹nda sizlere tatmin olabileceiniz kadar 巽ok ey 旦retebilecek bir 巽al脹ma olmayaca脹n脹n alt脹n脹 巽izmek istiyorum. Burada i biraz okuyucuya d端端yor. Bu 巽al脹mada genel hatt脹yla ele al脹nan konular脹 daha detayl脹 旦renerek, arat脹rma yaparak ve azimle 巽al脹arak kendinizi gelitirmek art脹yla bir eyler 旦renebilirsiniz.
This document provides guidance on designing RESTful APIs. It recommends using nouns instead of verbs, keeping URLs simple with only two endpoints per resource, and following conventions from leading APIs. Complex variations and optional parameters should be "swept behind the '?'." The document emphasizes designing for application developers by making APIs intuitive, consistent and complete while also accommodating exceptional clients. It suggests adding an API virtualization layer to handle complexity.
BTRisk Android Mobil Uygulama Denetimi Eitimi sunumumuz aa脹daki ana konu bal脹klar脹ndan olumaktad脹r:
Mobil Uygulama Mimarisi
-Android 聴letim Sistemi
-Android Rooting
-Android G端venlik Mimarisi
-Uygulama Dili D旦n端端mleri
-Dalvik Virtual Machine
ARM (Advanced Risk Machines) Mimamrisi
Mobil Uygulama Fonksiyonalitesi
Androdi Uygulama Bileenleri
Uygulama Eriim 聴zinleri
Android Hacking Metodlar脹
-Root Kontrol端n端 Ama Y旦ntemleri
-SSL Pinning Atlatma Y旦ntemleri
-Android Debug Altyap脹s脹
-Kritolu Verilerin Okunmas脹
-IPC (Inter Process Communication) Sald脹r脹lar脹
-Cihaz zerinde Saklanan Bilgiler
-Cihaz Loglar脹ndan S脹zan Bilgiler
Obfuscation (Karma脹klat脹rma) Y旦ntemleri
Ekran Resmi ekme ve Recent Apps Ekran G旦r端nt端leri
Kontrols端z G旦nderilen Broadcast Mesajlar脹
TensorFlow is an open source software library for machine learning developed by Google. It provides primitives for defining functions on tensors and automatically computing their derivatives. TensorFlow represents computations as data flow graphs with nodes representing operations and edges representing tensors. It is widely used for neural networks and deep learning tasks like image classification, language processing, and speech recognition. TensorFlow is portable, scalable, and has a large community and support for deployment compared to other frameworks. It works by constructing a computational graph during modeling, and then executing operations by pushing data through the graph.
This document provides an overview of CI/CD on Google Cloud Platform. It discusses key DevOps principles like treating infrastructure as code and automating processes. It then describes how GCP services like Cloud Build, Container Registry, Source Repositories, and Stackdriver can help achieve CI/CD. Spinnaker is mentioned as an open-source continuous delivery platform that integrates well with GCP. Overall the document outlines the benefits of CI/CD and how GCP makes CI/CD implementation easy and scalable.
Window alarda sald脹rganlar脹n yatay hareketleri ve bunlar脹n tespiti konusunda d端zenlediimiz webinarda kullan脹lan sunumdur.
Amac脹m脹z sald脹r脹 ve savunma taraf脹n脹n bak脹 a巽脹lar脹n脹 bir arada sunmakt脹.
Siber sald脹r脹lar脹n tespitinde ve olay m端dahalesinde Windows sistemlerin loglar脹 bize 旦nemli bilgiler verir. Sistemin ilk ele ge巽irildii andan balayarak siber sald脹rganlar脹n yerel ada yay脹lmas脹na kadar pek 巽ok ad脹ma bu loglar 端remektedir.
Webinarda aa脹daki konular脹 ele ald脹k:
1- Siber l端m Zinciri: Siber sald脹r脹lar脹n 7+1 ad脹m脹
2- Yatay hareket (lateral movement): Siber sald脹rganlar脹n yerel adaki davran脹lar脹
3- Fidye yaz脹l脹mlardaki rol端: Fidye yaz脹l脹mlar脹n yerel ada yay脹lmak i巽in kulland脹脹 teknikler
4- Yaan脹lan senaryolardan 旦rnekler
5- Yatay hareket i巽in kullan脹lan ara巽lar: Siber sald脹rganlar taraf脹ndan kullan脹lan ara巽lar
6- Windows Event Logs: Yatay hareketleri tespit etmek i巽in kullan脹labilecek loglar
7- LogonTracer Arac脹: Log analizini kolaylat脹racak 端cretsiz bir ara巽
8- Olay tespiti ve m端dahalesinde Microsoft Advanced Threat Analytics (ATA) arac脹 kullan脹m脹
9- Yatay hareket tespiti i巽in 旦neriler
================
Sorular脹n脹z i巽in sparta@sparta.com.tr
This slide deck Introduces Chef and its role in DevOps. The agenda of the deck is as follows:
- A Review of DevOps
- BMs Continuous Delivery solution
- Introduction to Chef
- Chef and Continuous Delivery
Read more on DevOps: http://sdarchitect.wordpress.com/understanding-devops/
This document provides an overview of big data, Hadoop ecosystem, and data science. It discusses key concepts like what big data is, different types of big data, evolution of big data technologies, components of Hadoop ecosystem like MapReduce, HDFS, HBase, components for data ingestion and analytics. It also summarizes common techniques used in data science like descriptive analytics, predictive analytics, prescriptive analytics, and provides examples of exploratory data analysis and data mining.
The document discusses Kubernetes networking. It describes how Kubernetes networking allows pods to have routable IPs and communicate without NAT, unlike Docker networking which uses NAT. It covers how services provide stable virtual IPs to access pods, and how kube-proxy implements services by configuring iptables on nodes. It also discusses the DNS integration using SkyDNS and Ingress for layer 7 routing of HTTP traffic. Finally, it briefly mentions network plugins and how Kubernetes is designed to be open and customizable.
TensorFlow is an open source software library for machine learning developed by Google. It provides primitives for defining functions on tensors and automatically computing their derivatives. TensorFlow represents computations as data flow graphs with nodes representing operations and edges representing tensors. It is widely used for neural networks and deep learning tasks like image classification, language processing, and speech recognition. TensorFlow is portable, scalable, and has a large community and support for deployment compared to other frameworks. It works by constructing a computational graph during modeling, and then executing operations by pushing data through the graph.
This document provides an overview of CI/CD on Google Cloud Platform. It discusses key DevOps principles like treating infrastructure as code and automating processes. It then describes how GCP services like Cloud Build, Container Registry, Source Repositories, and Stackdriver can help achieve CI/CD. Spinnaker is mentioned as an open-source continuous delivery platform that integrates well with GCP. Overall the document outlines the benefits of CI/CD and how GCP makes CI/CD implementation easy and scalable.
Window alarda sald脹rganlar脹n yatay hareketleri ve bunlar脹n tespiti konusunda d端zenlediimiz webinarda kullan脹lan sunumdur.
Amac脹m脹z sald脹r脹 ve savunma taraf脹n脹n bak脹 a巽脹lar脹n脹 bir arada sunmakt脹.
Siber sald脹r脹lar脹n tespitinde ve olay m端dahalesinde Windows sistemlerin loglar脹 bize 旦nemli bilgiler verir. Sistemin ilk ele ge巽irildii andan balayarak siber sald脹rganlar脹n yerel ada yay脹lmas脹na kadar pek 巽ok ad脹ma bu loglar 端remektedir.
Webinarda aa脹daki konular脹 ele ald脹k:
1- Siber l端m Zinciri: Siber sald脹r脹lar脹n 7+1 ad脹m脹
2- Yatay hareket (lateral movement): Siber sald脹rganlar脹n yerel adaki davran脹lar脹
3- Fidye yaz脹l脹mlardaki rol端: Fidye yaz脹l脹mlar脹n yerel ada yay脹lmak i巽in kulland脹脹 teknikler
4- Yaan脹lan senaryolardan 旦rnekler
5- Yatay hareket i巽in kullan脹lan ara巽lar: Siber sald脹rganlar taraf脹ndan kullan脹lan ara巽lar
6- Windows Event Logs: Yatay hareketleri tespit etmek i巽in kullan脹labilecek loglar
7- LogonTracer Arac脹: Log analizini kolaylat脹racak 端cretsiz bir ara巽
8- Olay tespiti ve m端dahalesinde Microsoft Advanced Threat Analytics (ATA) arac脹 kullan脹m脹
9- Yatay hareket tespiti i巽in 旦neriler
================
Sorular脹n脹z i巽in sparta@sparta.com.tr
This slide deck Introduces Chef and its role in DevOps. The agenda of the deck is as follows:
- A Review of DevOps
- BMs Continuous Delivery solution
- Introduction to Chef
- Chef and Continuous Delivery
Read more on DevOps: http://sdarchitect.wordpress.com/understanding-devops/
This document provides an overview of big data, Hadoop ecosystem, and data science. It discusses key concepts like what big data is, different types of big data, evolution of big data technologies, components of Hadoop ecosystem like MapReduce, HDFS, HBase, components for data ingestion and analytics. It also summarizes common techniques used in data science like descriptive analytics, predictive analytics, prescriptive analytics, and provides examples of exploratory data analysis and data mining.
The document discusses Kubernetes networking. It describes how Kubernetes networking allows pods to have routable IPs and communicate without NAT, unlike Docker networking which uses NAT. It covers how services provide stable virtual IPs to access pods, and how kube-proxy implements services by configuring iptables on nodes. It also discusses the DNS integration using SkyDNS and Ingress for layer 7 routing of HTTP traffic. Finally, it briefly mentions network plugins and how Kubernetes is designed to be open and customizable.
Bu seminerde Go programlama diline h脹zl脹 bir bak脹 att脹k. 2017'de verdiim Go seminerinin balant脹s脹na da bu sunumun kaynaklar k脹sm脹ndan ulaabilirsiniz.
www.cihanozhan.com
www.deeplab.co
www.darkfactory.co
Blockchain : Decentralized Application Development (Turkish)Cihan zhan
油
www.cihanozhan.com
*It is the presentation of my blockchain event that I presented in 2019.
Teknopark Istanbul Announcement : https://www.teknoparkistanbul.com.tr/egitimler/blockchain-decentralized-uygulama-gelistirme-sunumu
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityCihan zhan
油
This document discusses technologies related to machine learning, deep learning, computer vision, and artificial intelligence. It covers topics such as ML/DL algorithms, applications, data objects, cloud computing services, distributed systems, security issues, model lifecycles, publishing ML projects, and adversarial attacks against various AI systems including image, speech, NLP, remote sensing, autonomous vehicles, and industrial applications. It also provides links to the founder's online profiles and contact information.
10. Python Neden Pop端ler?
Kolay 旦renilebilir
Gereksiz kod karmaas脹 yok
Y端ksek seviyeli bir dil
B端y端k bir topluluk desteine sahip
oklu-platform uygulama gelitirme destei
T端m bunlar nedeniyle 巽ook fazla a巽脹k kaynakl脹 projede tercih ediliyor
11. Python ile Neler Yap脹labilir?
Sistem & A Uygulamalar脹
G端venlik & Hacking Ara巽lar脹
Web Uygulamalar脹
Masa端st端 Uygulamalar
API / RESTful / Microservice Uygulamalar脹
Mobil Uygulamalar
Bot & Crawler Uygulamalar脹
Otomasyon & Ara巽 Seti(Tool) Uygulamalar脹
Oyun Uygulamalar脹
Yapay Zeka Uygulamalar脹
ML : Machine Learning
DL : Deep Learning
CV : Computer Vision
NLP : Natural Language Processing
Visualization
Ve daha bir巽ok