alikapucu.com alikapucu.com

alikapucu.com

ali kapucu blog

Penetration Tester, Security and Network Design Engineer. Friday, April 17, 2015. Everybody in security needs to know these. Saturday, May 17, 2014. Using Array in Shell Scripting. We cannot imagine a programming language without the concept of arrays. It doesn’t matter how they are implemented among various languages. Instead arrays help us in consolidating data, similar or different, under one symbolic name. Array Initialization and Usage. Array indexing always start with 0. Now upon executing the abov...

http://www.alikapucu.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR ALIKAPUCU.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

December

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Saturday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.7 out of 5 with 9 reviews
5 star
4
4 star
2
3 star
1
2 star
0
1 star
2

Hey there! Start your review of alikapucu.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

2 seconds

CONTACTS AT ALIKAPUCU.COM

Alyy Corp.

Ali KAPUCU

Kas●●●asa

Ist●●●bul , 34100

TURKEY

9555●●●●5555
al●●●●●●●@gmail.com

View this contact

Kasimpasa

Istanbul Beyog●●●●●●●●●●●●●●CU) Alyy Corp.

TURKEY

9555●●●●5555
al●●●●●●●@gmail.com

View this contact

Kasimpasa

Istanbul Beyog●●●●●●●●●●●●●●CU) Alyy Corp.

TURKEY

al●●●●●●●@gmail.com

View this contact

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

DOMAIN REGISTRATION INFORMATION

REGISTERED
2009 January 18
UPDATED
2014 January 19
EXPIRATION
EXPIRED REGISTER THIS DOMAIN

BUY YOUR DOMAIN

Network Solutions®

DOMAIN AGE

  • 15

    YEARS

  • 4

    MONTHS

  • 7

    DAYS

NAME SERVERS

1
rose.ns.cloudflare.com
2
seth.ns.cloudflare.com

REGISTRAR

GODADDY.COM, LLC

GODADDY.COM, LLC

WHOIS : whois.godaddy.com

REFERRED : http://registrar.godaddy.com

CONTENT

SCORE

6.2

PAGE TITLE
ali kapucu blog | alikapucu.com Reviews
<META>
DESCRIPTION
Penetration Tester, Security and Network Design Engineer. Friday, April 17, 2015. Everybody in security needs to know these. Saturday, May 17, 2014. Using Array in Shell Scripting. We cannot imagine a programming language without the concept of arrays. It doesn’t matter how they are implemented among various languages. Instead arrays help us in consolidating data, similar or different, under one symbolic name. Array Initialization and Usage. Array indexing always start with 0. Now upon executing the abov...
<META>
KEYWORDS
1 ali kapucu blog
2 pages
3 who am i
4 nisan foto
5 diffie helman and rsa
6 posted by
7 ali kapucu
8 no comments
9 email this
10 blogthis
CONTENT
Page content here
KEYWORDS ON
PAGE
ali kapucu blog,pages,who am i,nisan foto,diffie helman and rsa,posted by,ali kapucu,no comments,email this,blogthis,share to twitter,share to facebook,share to pinterest,labels diffie hellman,encryption,shell builtin,declare a var,var xx = value,var xx }
SERVER
cloudflare-nginx
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

ali kapucu blog | alikapucu.com Reviews

https://alikapucu.com

Penetration Tester, Security and Network Design Engineer. Friday, April 17, 2015. Everybody in security needs to know these. Saturday, May 17, 2014. Using Array in Shell Scripting. We cannot imagine a programming language without the concept of arrays. It doesn’t matter how they are implemented among various languages. Instead arrays help us in consolidating data, similar or different, under one symbolic name. Array Initialization and Usage. Array indexing always start with 0. Now upon executing the abov...

INTERNAL PAGES

alikapucu.com alikapucu.com
1

ali kapucu blog: Packet Sniffing Basics

http://www.alikapucu.com/2012/09/packet-sniffing-basics.html

Penetration Tester, Security and Network Design Engineer. Saturday, September 15, 2012. Your data isn't safe on public networks. You may not even realize the extent to which that statement is true. More than likely not. This mischievous ne'er-do-well probably was sitting in the coffee shop you stopped at and seized the opportunity. What Is Packet Sniffing? Figure 1. A Capture of a Packet of Someone Trying to Log In to a Web Site. How Does It Work? First, packet sniffing is a passive technique. No one...

2

ali kapucu blog: April 2015

http://www.alikapucu.com/2015_04_01_archive.html

Penetration Tester, Security and Network Design Engineer. Friday, April 17, 2015. Everybody in security needs to know these. Subscribe to: Posts (Atom). Cisco ASA BW Throttling. Today I had a task for limiting bandwidth for a client behind my Cisco ASA.  This place has 100Mbit/s connection and I want to throttle on. Your data isnt safe on public networks. You may not even realize the extent to which that statement is true. Imagine this: you&#3. PhpMyAdmin 3.5.2.2 server sync.php Backdoor. Ls order by time.

3

ali kapucu blog: January 2013

http://www.alikapucu.com/2013_01_01_archive.html

Penetration Tester, Security and Network Design Engineer. Tuesday, January 22, 2013. Secure Shell Key PassPhrase Change. If you want to change your passphare and use no password for your secure shell keys use command below. Ssh-keygen -p -P old passphrase -N “” -f /home/akapucu/.ssh/id rsa. Friday, January 11, 2013. Getting list of live IPs in your network. We will use nmap and linux commands for finding live hosts in the network. Nmap -sS xxx.xxx.xxx.xxx/xx -oA filename. Subscribe to: Posts (Atom).

4

ali kapucu blog: Getting list of live IPs in your network

http://www.alikapucu.com/2013/01/getting-list-of-live-ips-in-your-network.html

Penetration Tester, Security and Network Design Engineer. Friday, January 11, 2013. Getting list of live IPs in your network. We will use nmap and linux commands for finding live hosts in the network. First, we will run nmap for network scan, I will pick small /24 network for testting. Nmap -sS xxx.xxx.xxx.xxx/xx -oA filename. This command will give you 3 different files. I will use scan.gnmap, Lets see what is in it? Cat scan,gnmap grep open cut -d " " -f2. January 11, 2013 at 7:24 PM. Ls order by time.

5

ali kapucu blog: Change network interface name on ubuntu

http://www.alikapucu.com/2013/03/change-network-interface-name-on-ubuntu.html

Penetration Tester, Security and Network Design Engineer. Thursday, March 7, 2013. Change network interface name on ubuntu. For the record, i would like to remind myself how to change network interface name on ubuntu. Sudo nano /etc/udev/rules.d/70-persistent-net.rules. By default, it assigns the name eth0. Etc to the NIC(s):. And change configuration file as well. Subscribe to: Post Comments (Atom). Change network interface name on ubuntu. Cisco ASA BW Throttling. Cisco ASA BW Throttling. Q : How do I e...

UPGRADE TO PREMIUM TO VIEW 13 MORE

TOTAL PAGES IN THIS WEBSITE

18

LINKS TO THIS WEBSITE

cbolat.blogspot.com cbolat.blogspot.com

cbolat: April 2011

http://cbolat.blogspot.com/2011_04_01_archive.html

Yet another hacking and (in)security related blog. Wednesday, April 20, 2011. SQL Injection Üzerinden LFI. SQL Injection üzerinden LFI bug’ları yakalamak her zaman karşılaşılabilecek bir durum olmasa bile karşılaşıldığı zaman çok kullanışlı olabilen bir zafiyet türü. Söz konusu zafiyet, uygulamanın DBMS’te yaptığı sorgu sonucunda dönen kolonlara ait verileri include, require, include once, require once gibi fonksiyonlara parametre olarak verdiğinde ortaya çıkmakta. Posted by Canberk Bolat.

cbolat.blogspot.com cbolat.blogspot.com

cbolat: CVE-2012-2760 Session Stealing in mod_auth_openid

http://cbolat.blogspot.com/2012/08/cve-2012-2760-session-stealing-in.html

Yet another hacking and (in)security related blog. Tuesday, August 28, 2012. CVE-2012-2760 Session Stealing in mod auth openid. As advisory describing, mod auth openid is vulnerable to session stealing. Because "Session ids are stored insecurely in /tmp/mod auth openid.db (default filename). The db is world readable and the session ids are stored unencrypted." [1]. Dear mod auth openid developers, you should use database file encryption. :(. 1] http:/ seclists.org/fulldisclosure/2012/May/238.

cbolat.blogspot.com cbolat.blogspot.com

cbolat: December 2010

http://cbolat.blogspot.com/2010_12_01_archive.html

Yet another hacking and (in)security related blog. Thursday, December 30, 2010. Funny ImageMagic CMD Injection. Sometimes i don't read vendors vulnerability reports, because they are so boring and don't give technical information about vulnerability. Last day, i read Ubuntu Security Notice's vulnerability report and it seemed interesting. Firstly, i read description section, it says;. It was discovered that ImageMagick would search for configuration files in. Code with the user's privileges. Hello dear, ...

cbolat.blogspot.com cbolat.blogspot.com

cbolat: MS12-076 Excel SerAuxErrBar Heap Overflow Vulnerability

http://cbolat.blogspot.com/2013/05/ms12-076-excel-serauxerrbar-heap.html

Yet another hacking and (in)security related blog. Saturday, May 11, 2013. MS12-076 Excel SerAuxErrBar Heap Overflow Vulnerability. There was a Heap Overflow vulnerability (CVE-2012-1885) in Excel while parsing SerAuxErrBar structure from xls (Excel's old binary format) files. So I decided to took on it (a little bit analysis). But I faced with reality that there is no public debugging symbols for Excel :( When I read advisory [1]. So it should be related with error bar. But WTF is Error Bar [3]. I was s...

cbolat.blogspot.com cbolat.blogspot.com

cbolat: July 2011

http://cbolat.blogspot.com/2011_07_01_archive.html

Yet another hacking and (in)security related blog. Wednesday, July 27, 2011. Return-Oriented Programming / DEP Bypass. Öncelikle şunu belirtmekte fayda var bu makale Türkiye güvenlik and hacking topluluğuna destek amaçlı teknik konularda bilgi ve beceri kazandırabilme adına yazılmıştır. Makalede eksik ya da yanlış gördüğünüz kısımları lütfen yorum olarak/e-mail ile bana ulaştırınız gerekli düzenlemeleri hep birlikte yapalım. Ayrıca şunuda belirtmek lazım şuan için bu makalede sadece Windows üzeri...Yani ...

cbolat.blogspot.com cbolat.blogspot.com

cbolat: February 2012

http://cbolat.blogspot.com/2012_02_01_archive.html

Yet another hacking and (in)security related blog. Friday, February 24, 2012. Java Web Start Cmd Arg Injection. Posted by Canberk Bolat. Thursday, February 16, 2012. MS11-100 - ASP.NET Forms Auth. Bypass - Revenge of the 0x00. Güncellemesi ile geçen ay sonlarına doğru meşhur HashTable Collision DoS ( CVE-2011-3414. NET Forms Authentication Bypass ( CVE-2011-3416. Posted by Canberk Bolat. Friday, February 3, 2012. Is Microsoft's ForeFront bypassable? We have a session! Posted by Canberk Bolat. Görüldüğü ü...

cbolat.blogspot.com cbolat.blogspot.com

cbolat: August 2012

http://cbolat.blogspot.com/2012_08_01_archive.html

Yet another hacking and (in)security related blog. Tuesday, August 28, 2012. CVE-2012-2760 Session Stealing in mod auth openid. As advisory describing, mod auth openid is vulnerable to session stealing. Because "Session ids are stored insecurely in /tmp/mod auth openid.db (default filename). The db is world readable and the session ids are stored unencrypted." [1]. Dear mod auth openid developers, you should use database file encryption. :(. 1] http:/ seclists.org/fulldisclosure/2012/May/238. Is an optim...

cbolat.blogspot.com cbolat.blogspot.com

cbolat: May 2013

http://cbolat.blogspot.com/2013_05_01_archive.html

Yet another hacking and (in)security related blog. Saturday, May 11, 2013. MS12-076 Excel SerAuxErrBar Heap Overflow Vulnerability. There was a Heap Overflow vulnerability (CVE-2012-1885) in Excel while parsing SerAuxErrBar structure from xls (Excels old binary format) files. So I decided to took on it (a little bit analysis). But I faced with reality that there is no public debugging symbols for Excel :( When I read advisory [1]. Posted by Canberk Bolat. Subscribe to: Posts (Atom).

cbolat.blogspot.com cbolat.blogspot.com

cbolat: July 2012

http://cbolat.blogspot.com/2012_07_01_archive.html

Yet another hacking and (in)security related blog. Monday, July 9, 2012. IE Col Element Heap Overflow Vulnerability (CVE-2012-1876) PoC. IE Col Element Heap Overflow Vulnerability (CVE-2012-1876) PoC . Author of this vulnerability) released detailed blog post about this vulnerability. Posted by Canberk Bolat. Subscribe to: Posts (Atom). View my complete profile. IE Col Element Heap Overflow Vulnerability (CVE-20. Travel template. Template images by centauria.

cbolat.blogspot.com cbolat.blogspot.com

cbolat: WebKit cssText NULL Ptr Deref

http://cbolat.blogspot.com/2012/09/webkit-csstext-null-ptr-deref.html

Yet another hacking and (in)security related blog. Sunday, September 2, 2012. WebKit cssText NULL Ptr Deref. Just tested with Chrome 21.0.1180.89 m (latest version). 0:000 r eax=00000000 ebx=015ccfb0 ecx=00000000 edx=0014ea24 esi=01e00440 edi=01e44630 eip=58fcd2a8 esp=0014e8b0 ebp=0014e8b4 iopl=0 nv up ei pl nz na po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202 chrome 58bf0000! WebCore: CSSValue: cssText 0x8: 58fcd2a8 8b4804 mov ecx,dword ptr [eax 4] ds:002b:00000004=?

UPGRADE TO PREMIUM TO VIEW 10 MORE

TOTAL LINKS TO THIS WEBSITE

20

OTHER SITES

alikaptank.com alikaptank.com

ALİ KAPTAN-K | Daily, 3-4 Days, Weekly Boat Tours - Fethiye

Web Sayfamıza Hoş Geldiniz. Günlük, 3-4 günlük veya haftalık özel turlarda,. Profesyonel güler yüzlü ekibi, kaliteli hizmet anlayışı, rahat ve konforlu teknesi ve 20 yıllık tecrübesi. Ile Ali Kaptan-K,. Fethiyenin ve Akdenizin eşsiz koylarına yapacağınız mavi yolculuklarda sizlere hizmet vermekten gurur duyar. 1 adet Master Kabin. 2 adet İki Kişilik Kabin. Ali Kaptan-K' dan görüntüler. Tüm hakları saklıdır.Ali Kaptan-K 2012 Fethiye, MUĞLA-TURKEY.

alikaptann.com alikaptann.com

Home

Online, builder, online builder. Song 0 http:/ www.youtube.com/watch? V=7-7knsP2n5w,Song 1 https:/ www.youtube.com/watch? V=pRpeEdMmmQ0,Song 2 https:/ www.youtube.com/watch? V=uiH4BFTELME,Song 3 https:/ www.youtube.com/watch? V=-8gr5GS2Sno,Song 4 https:/ www.youtube.com/watch? V=hBqFc6nW 5c,Song 5 https:/ www.youtube.com/watch?

alikaptanoglu.org alikaptanoglu.org

DOMAIN ERROR

alikaptanoglu1.blogcu.com alikaptanoglu1.blogcu.com

Sözlükçü

2 Takipçi 4 Takip. Osmangazi üniversitesi öğrencileri tarafından kurulan www.ogusozluk.com sitesi açılmıştır.Eskişehir de okuyan bütün arkadaşlarımıza duyurulur.Sözlük geniş bir yelpanzede olup bir çok kategoride enteresan bilgi ve iyi yazarlarıyla hizmet vericektir.Zamanında yazar olmanız tavsiye olunup bu kıymetli kadro içinde bulunmanız ilerde size iyi gelebilir.Birçok sözlük sitesi gibi sitede ekşi tarzı olup ...

alikapucu.com alikapucu.com

ali kapucu blog

Penetration Tester, Security and Network Design Engineer. Friday, April 17, 2015. Everybody in security needs to know these. Saturday, May 17, 2014. Using Array in Shell Scripting. We cannot imagine a programming language without the concept of arrays. It doesn’t matter how they are implemented among various languages. Instead arrays help us in consolidating data, similar or different, under one symbolic name. Array Initialization and Usage. Array indexing always start with 0. Now upon executing the abov...

alikaputri.wordpress.com alikaputri.wordpress.com

About Us | not about me or you, but about us :)

Not about me or you, but about us :). Belajar Untuk Hidup dan Hidup untuk belajar. Always be my bff. Create a free website or blog at WordPress.com. Create a free website or blog at WordPress.com. Follow “About Us”. Get every new post delivered to your Inbox. Join 52 other followers. Build a website with WordPress.com. Add your thoughts here. (optional).

alikaputri28.wordpress.com alikaputri28.wordpress.com

alikaputri28

Rupanya kami tidak dapat menemukan apa yang Anda cari. Mungkin pencarian dapat membantu. Blog di WordPress.com. Blog di WordPress.com.

alikar.blogcu.com alikar.blogcu.com

alikar - alikar - Blogcu.com

Bu kullanıcıya ait içerik bulunmamaktadır. İsterseniz Blogcu kategorilerinden öne çıkan içeriklere göz atabilirsiniz. Üye blogların içeriğinden blog yazarları sorumludur. Şikayetler için tıklayınız.

alikar.com alikar.com

Alikar Gardens

Colorado Springs' Finest, Furnished Executive Suites, One and Two Bedroom Apartment Homes. Corporate and Short Term. Gallery and Floor Plans. Best value for your money. Furnished and unfurnished housing. 3-12 month lease options. Month to Month No Lease Options. Optional housekeeping services available. Experienced and knowledgeable staff. Premier furniture packages available. Peaceful. Comfortable. Affordable. Heated year-round, Italian tiled pool and spa. Private fitness center with free WiFi. I stayed...

alikar.com.tr alikar.com.tr

ALİKAR SOĞUTMA SİSTEMLERİ, Soğuk Oda, Raf Sistemleri, Şoklama Odaları