[{"data":1,"prerenderedAt":595},["ShallowReactive",2],{"posts_index":3},[4,19,35,48,60,72,84,93,106,118,130,142,154,166,178,191,203,217,228,239,250,261,272,283,295,306,317,328,339,350,361,372,383,394,407,418,429,440,451,462,473,484,495,507,519,533,545,556,569,582],{"_path":5,"title":6,"description":7,"date":8,"updated":8,"image":9,"categories":10,"tags":12,"recommend":13,"readingTime":14},"\u002F2025\u002F2-dev-null-command-what-is-and-what-is-useful","What is the 2>\u002Fdev\u002Fnull Command and What Does It Do?","You might have seen this command in many places, and it might seem complex at first. But don't worry, in this content, we'll cover the basics and clarify the questions in our minds.","2025-05-03T12:55:53.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002F2-dev-null-command-what-is-and-what-is-useful\u002F1.jpg",[11],"Linux",[],false,{"text":15,"minutes":16,"time":17,"words":18},"4 min read",3.9,234000,780,{"_path":20,"title":21,"description":22,"date":23,"updated":23,"image":24,"categories":25,"tags":27,"readingTime":30},"\u002F2025\u002Faws-ai-ml-ve-veri-analitigi","8 - AWS AI\u002FML ve Veri Analitiği","Bu yazı, Yapay Zeka (AI), Makine Öğrenimi (ML), Üretken Yapay Zeka (GenAI) ve AWS üzerindeki Veri Analitiği süreçlerini kapsamaktadır.","2025-11-26T08:40:07.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-ai-ml-ve-veri-analitiği\u002F1.jpg",[26],"Cloud",[28,29],"AWS","CLF-C02",{"text":31,"minutes":32,"time":33,"words":34},"5 min read",4.55,273000,910,{"_path":36,"title":37,"description":38,"date":39,"updated":39,"image":40,"categories":41,"tags":42,"readingTime":43},"\u002F2025\u002Faws-bulut-yonetimi-temel-ilkeler-ve-hizmetler","10 - AWS Bulut Yönetimi: Temel İlkeler ve Hizmetler","AWS bulut altyapısında güvenlik, izleme, denetim ve uyumluluk süreçlerini yönetmek için kullanılan temel hizmetler (CloudWatch, CloudTrail, Config, Organizations) ve yönetim ilkeleri.","2025-11-26T12:09:18.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-bulut-yonetimi-temel-ilkeler-ve-hizmetler\u002F2.jpg",[26],[28,29],{"text":44,"minutes":45,"time":46,"words":47},"3 min read",2.9,174000,580,{"_path":49,"title":50,"description":51,"date":52,"updated":52,"image":53,"categories":54,"tags":55,"readingTime":56},"\u002F2025\u002Faws-compute-hizmetlerini-kesfetme","3 - AWS Hesaplama (Compute) Hizmetlerini Keşfetme","Bu yazı, AWS üzerindeki hesaplama modellerini, sunucusuz (serverless) mimarileri, konteyner yönetimini ve belirli iş yükleri için özelleştirilmiş diğer hesaplama hizmetlerini kapsar.","2025-11-24T12:01:59.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-compute-hizmetlerini-keşfetme\u002F10.jpg",[26],[28,29],{"text":44,"minutes":57,"time":58,"words":59},2.285,137100,457,{"_path":61,"title":62,"description":63,"date":64,"updated":64,"image":65,"categories":66,"tags":67,"readingTime":68},"\u002F2025\u002Faws-databases","7 - AWS Veritabanı Hizmetleri","AWS, geleneksel ilişkisel veritabanlarından gelişmiş NoSQL ve bellek içi çözümlere kadar geniş bir yelpazede, tamamen yönetilen (fully managed) veritabanı hizmetleri sunar. Bu yazımızda bu hizmetleri inceleyeceğiz.","2025-11-26T07:39:08.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-databases\u002F1.jpg",[26],[28,29],{"text":44,"minutes":69,"time":70,"words":71},2.75,165000,550,{"_path":73,"title":74,"description":75,"date":76,"updated":76,"image":77,"categories":78,"tags":79,"readingTime":80},"\u002F2025\u002Faws-ec2-ve-temel-servisler","2 - Amazon EC2 ve Temel Servisler","Bu yazı, AWS'in temel yapı taşı olan EC2 (Elastic Compute Cloud), fiyatlandırma modelleri, ölçeklendirme, uygulama mimarisi ve temel servisler konularını kapsar.","2025-11-23T16:44:46.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-ec2-ve-temel-servisler\u002F11.jpg",[26],[28,29],{"text":44,"minutes":81,"time":82,"words":83},2.86,171600,572,{"_path":85,"title":86,"description":87,"date":88,"updated":88,"image":89,"categories":90,"tags":91,"readingTime":92},"\u002F2025\u002Faws-goc-ve-modernizasyon","12 - AWS Göç ve Modernizasyon (Migration & Modernization)","Bu yazı, AWS'ye geçiş süreçleri, stratejileri, kullanılan araçlar ve temel çerçeveleri kapsamaktadır.","2025-11-26T18:27:46.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-goç-ve-modernizasyon\u002F1.jpg",[26],[28,29],{"text":44,"minutes":45,"time":46,"words":47},{"_path":94,"title":95,"description":96,"date":97,"updated":97,"image":98,"categories":99,"tags":100,"readingTime":101},"\u002F2025\u002Faws-iyi-mimari-icin-hizmetler","13 - AWS İyi Mimari için Hizmetler","Farklı kullanım alanlarına yönelik AWS servisleri (Dev, IoT, EUC) ve ideal bulut mimarisi oluşturmak için kullanılan Well-Architected çerçevesi hakkında temel bilgiler.","2025-11-26T19:04:47.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-iyi-mimari-icin-hizmetler\u002F1.jpg",[26],[28,29],{"text":102,"minutes":103,"time":104,"words":105},"2 min read",1.795,107700,359,{"_path":107,"title":108,"description":109,"date":110,"updated":110,"categories":111,"tags":112,"image":113,"readingTime":114},"\u002F2025\u002Faws-kuresel-altyapisi-ve-olceklenebilirlik","4 - AWS Küresel Altyapısı ve Ölçeklenebilirlik","AWS üzerinde küresel bir yapı kurmak, kaynakların stratejik dağıtımını, hizmet hızını ve standartlaştırılmış kurulumları yönetmeyi gerektirir.","2025-11-24T18:37:05.000Z",[26],[28,29],"https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-küresel-altyapısı-ve-ölçeklenebilirlik\u002Fthumbnail.jpg",{"text":102,"minutes":115,"time":116,"words":117},1.475,88500,295,{"_path":119,"title":120,"description":121,"date":122,"updated":122,"image":123,"categories":124,"tags":125,"readingTime":126},"\u002F2025\u002Faws-maliyet-yonetimi-ve-destek-hizmetleri","11 - AWS Maliyet Yönetimi ve Destek Hizmetleri","AWS maliyet yönetimi, destek planları ve tasarruf stratejileri üzerine notlar.","2025-11-26T17:49:48.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-maliyet-yonetimi-ve-destek-hizmetleri\u002F1.jpg",[26],[28,29],{"text":44,"minutes":127,"time":128,"words":129},2.585,155100,517,{"_path":131,"title":132,"description":133,"date":134,"updated":134,"image":135,"categories":136,"tags":137,"readingTime":138},"\u002F2025\u002Faws-networking","5 - AWS Networking (Ağ Hizmetleri)","Bu cheatsheet, AWS ağ temelleri, güvenlik katmanları, bağlantı yöntemleri ve küresel ağ servisleri hakkında genel bir bakış sunar.","2025-11-25T11:16:00.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-networking\u002Fthumbail.jpg",[26],[28,29],{"text":44,"minutes":139,"time":140,"words":141},2.485,149100,497,{"_path":143,"title":144,"description":145,"date":146,"updated":146,"image":147,"categories":148,"tags":149,"readingTime":150},"\u002F2025\u002Faws-security","9 - AWS Security","Bu yazıda, AWS üzerindeki kimlik yönetimi, ağ koruması, şifreleme ve tehdit algılama hizmetlerine dair temel kavramları ve hizmetleri inceleyeceğiz.","2025-11-26T11:24:28.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-security\u002F2.jpg",[26],[28,29],{"text":44,"minutes":151,"time":152,"words":153},2.7,162000,540,{"_path":155,"title":156,"description":157,"date":158,"updated":158,"image":159,"categories":160,"tags":161,"readingTime":162},"\u002F2025\u002Faws-storage","6 - AWS Depolama Hizmetleri","AWS'de veri depolamak için üç temel yöntem bulunur: Blok, Nesne ve Dosya depolama. Her biri farklı performans gereksinimleri ve kullanım senaryoları için tasarlanmıştır.","2025-11-26T06:24:24.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-storage\u002F1.jpg",[26],[28,29],{"text":44,"minutes":163,"time":164,"words":165},2.89,173400,578,{"_path":167,"title":168,"description":169,"date":170,"updated":170,"image":171,"categories":172,"tags":173,"readingTime":174},"\u002F2025\u002Faws-ve-bulut-bilisim-temelleri","1 - AWS ve Bulut Bilişim Temelleri","AWS ve bulut bilişim temel kavramlarını, AWS'nin sunduğu avantajları ve küresel altyapısını anlatan giriş niteliğinde bir rehber.","2025-11-22T13:33:47.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-ve-bulut-bilişim-temelleri\u002F10.jpg",[26],[28,29],{"text":44,"minutes":175,"time":176,"words":177},2.435,146100,487,{"_path":179,"title":180,"description":181,"date":182,"updated":182,"image":183,"categories":184,"tags":186,"recommend":13,"readingTime":187},"\u002F2025\u002Fbasic-structure-of-ipv4-subnetting","Basic Structure of IPv4 - Subnetting","In this article, we will discuss the basic structure of IPv4, Network Masks, Host-Network IDs, Broadcast addresses, CIDR notation, Subnet calculations and more with examples.","2025-08-07T18:08:26.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Fbasic-structure-of-ipv4-subnetting\u002F1.jpg",[185],"Network",[],{"text":31,"minutes":188,"time":189,"words":190},4.51,270600,902,{"_path":192,"title":193,"description":194,"date":195,"updated":195,"image":196,"categories":197,"tags":198,"recommend":13,"readingTime":199},"\u002F2025\u002Ffile-permissions-and-management-in-linux","File Permissions and Permission Management in Linux","In Linux operating systems, permissions are a fundamental security mechanism that determines who can access files and directories and how that access is handled.","2025-05-03T08:11:08.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ffile-permissions-and-management-in-linux\u002F1.jpg",[11],[],{"text":44,"minutes":200,"time":201,"words":202},2.62,157200,524,{"_path":204,"title":205,"description":206,"date":207,"updated":207,"image":208,"categories":209,"recommend":211,"readingTime":212},"\u002F2025\u002Fhtb-artificial-writeup","HTB - Artificial","A detailed writeup on how to solve the Hack The Box 'Artificial' machine. This post covers gaining initial access through a TensorFlow model RCE, escalating privileges to the 'gael' user by cracking a password found in a database, and finally achieving root access by exploiting a 'backrest' backup service to retrieve the root user's SSH key.","2025-10-29T11:40:48.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Fhtb-artificial-writeup\u002Fthumbnail.jpg",[210],"CTF",true,{"text":213,"minutes":214,"time":215,"words":216},"7 min read",6.75,405000,1350,{"_path":218,"title":219,"description":220,"date":221,"updated":221,"image":222,"categories":223,"readingTime":224},"\u002F2025\u002Fhtb-cap-writeup","HTB - Cap","A step-by-step guide on how to solve the Hack The Box 'Cap' machine. This write-up covers the initial foothold by analyzing a pcap file to find FTP credentials and privilege escalation by exploiting python capabilities.","2025-10-27T15:49:55.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Fhtb-cap-writeup\u002Fthumbnail.jpg",[210],{"text":102,"minutes":225,"time":226,"words":227},1.885,113100,377,{"_path":229,"title":230,"description":231,"date":232,"updated":232,"image":233,"categories":234,"recommend":13,"readingTime":235},"\u002F2025\u002Ftryhackme-agentsudo-writeup","TryHackMe - Agent Sudo","In this write-up, we will solve TryHackMe's beginner-level 'Agent Sudo' room step-by-step. We will learn how to gain root privileges using web enumeration, FTP brute-forcing with Hydra, extracting hidden data with steganography, and exploiting the CVE-2019-14287 sudo vulnerability, all demonstrated with detailed visuals.","2025-08-19T11:07:27.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-AgentSudo-writeup\u002F1.jpg",[210],{"text":15,"minutes":236,"time":237,"words":238},3.905,234300,781,{"_path":240,"title":241,"description":242,"date":243,"updated":243,"image":244,"categories":245,"recommend":13,"readingTime":246},"\u002F2025\u002Ftryhackme-anthem-writeup","TryHackMe - Anthem","A comprehensive walkthrough of the TryHackMe Anthem room. This guide covers reconnaissance via robots.txt, gaining initial access to the Umbraco CMS, connecting via RDP, and escalating privileges on Windows by manipulating file permissions to reveal the administrator password.","2025-09-01T17:37:04.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-anthem-writeup\u002Fthumbnail.jpg",[210],{"text":102,"minutes":247,"time":248,"words":249},1.81,108600,362,{"_path":251,"title":252,"description":253,"date":254,"updated":254,"image":255,"categories":256,"recommend":13,"readingTime":257},"\u002F2025\u002Ftryhackme-archangel-writeup","TryHackMe - Archangel","A detailed writeup on the TryHackMe Archangel room. This walkthrough covers exploiting a Local File Inclusion (LFI) vulnerability to gain initial access through Apache log poisoning, and escalating privileges to root via a cronjob and PATH hijacking.","2025-09-08T17:50:48.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-archangel-writeup\u002Fthumbnail.jpg",[210],{"text":15,"minutes":258,"time":259,"words":260},3.13,187800,626,{"_path":262,"title":263,"description":264,"date":265,"updated":265,"image":266,"categories":267,"recommend":13,"readingTime":268},"\u002F2025\u002Ftryhackme-b3dr0ck-writeup","TryHackMe - b3dr0ck","A step-by-step guide to solving the b3dr0ck room on TryHackMe.","2025-09-04T15:20:00.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-b3dr0ck-writeup\u002Fthumbnail.jpg",[210],{"text":15,"minutes":269,"time":270,"words":271},3.045,182700,609,{"_path":273,"title":274,"description":275,"date":276,"updated":276,"image":277,"categories":278,"recommend":13,"readingTime":279},"\u002F2025\u002Ftryhackme-bountyhacker-writeup","TryHackMe - Bounty Hacker","A detailed beginner's guide to the TryHackMe Bounty Hacker room: discovery with Nmap\u002FRustscan, anonymous FTP access, SSH brute-force with Hydra, and privilege escalation with SUID (tar).","2025-08-18T08:05:30.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-BountyHacker-writeup\u002F1.jpg",[210],{"text":102,"minutes":280,"time":281,"words":282},1.705,102300,341,{"_path":284,"title":285,"description":286,"date":287,"updated":287,"image":288,"categories":289,"readingTime":290},"\u002F2025\u002Ftryhackme-brooklynninenine-writeup","TryHackMe - Brooklyn Nine Nine","A step-by-step solution guide for the TryHackMe Brooklyn Nine-Nine room. In this article, discover how to gain initial access by finding a user clue on an anonymous FTP server to brute-force an SSH password, and how to gain root privileges by exploiting a misconfigured sudo policy.","2025-08-25T08:28:54.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-brooklynninenine-writeup\u002Fthumbnail.jpg",[210],{"text":291,"minutes":292,"time":293,"words":294},"1 min read",0.36,21600,72,{"_path":296,"title":297,"description":298,"date":299,"updated":299,"image":300,"categories":301,"recommend":211,"readingTime":302},"\u002F2025\u002Ftryhackme-bruteit-writeup","TryHackMe - Brute It","In this article, we take a step-by-step look at the solution to TryHackMe's \"Brute It\" room. We gain full access using brute force attacks against the web login form with Hydra, and against the SSH key password and root password hash with John the Ripper.","2025-08-26T13:49:07.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-bruteit-writeup\u002Fthumbnail.jpg",[210],{"text":44,"minutes":303,"time":304,"words":305},2.16,129600,432,{"_path":307,"title":308,"description":309,"date":310,"updated":310,"image":311,"categories":312,"recommend":13,"readingTime":313},"\u002F2025\u002Ftryhackme-chillhack-writeup","TryHackMe - Chill Hack","A step-by-step walkthrough for the TryHackMe 'Chill Hack' room. This guide covers the entire process from initial reconnaissance and exploiting a command injection vulnerability to escalating privileges to root.","2025-08-28T11:03:29.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-chillhack-writeup\u002Fthumbnail.jpg",[210],{"text":15,"minutes":314,"time":315,"words":316},3.79,227400,758,{"_path":318,"title":319,"description":320,"date":321,"updated":321,"image":322,"categories":323,"readingTime":324},"\u002F2025\u002Ftryhackme-couch-writeup","TryHackMe - Couch","This post provides a step-by-step write-up for the TryHackMe 'Couch' room. Learn how to find credentials in a CouchDB database and escalate privileges to root by leveraging an insecure Docker port.","2025-10-22T06:11:23.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-couch-writeup\u002Fthumbnail.jpg",[210],{"text":102,"minutes":325,"time":326,"words":327},1.255,75300,251,{"_path":329,"title":330,"description":331,"date":332,"updated":332,"image":333,"categories":334,"recommend":13,"readingTime":335},"\u002F2025\u002Ftryhackme-cyborg-writeup","TryHackMe - Cyborg","In this article, we walk through solving TryHackMe's Cyborg room step by step. We gain initial access to the system using credentials leaked from an encrypted Borg backup and then obtain root privileges through a misconfigured sudo setup.","2025-08-23T05:49:06.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-cyborg-writeup\u002Fthumbnail.jpg",[210],{"text":102,"minutes":336,"time":337,"words":338},1.725,103500,345,{"_path":340,"title":341,"description":342,"date":343,"updated":343,"image":344,"categories":345,"recommend":211,"readingTime":346},"\u002F2025\u002Ftryhackme-fowsniff-writeup","TryHackMe - Fowsniff CTF","A full writeup for the TryHackMe Fowsniff CTF. Learn how to go from leaked credentials to root access by cracking MD5 hashes, pivoting from POP3 to SSH, and exploiting a writable MOTD script.","2025-09-02T07:57:20.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-fowsniff-writeup\u002Fthumbnail.jpg",[210],{"text":44,"minutes":347,"time":348,"words":349},2.955,177300,591,{"_path":351,"title":352,"description":353,"date":354,"updated":354,"image":355,"categories":356,"recommend":13,"readingTime":357},"\u002F2025\u002Ftryhackme-gamingserver-writeup","TryHackMe - GamingServer","A step-by-step guide to completing the TryHackMe GamingServer room. This walkthrough covers reconnaissance, gaining initial access, and escalating privileges using the LXD vulnerability.","2025-09-05T08:18:55.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-GamingServer-writeup\u002Fthumbnail.jpg",[210],{"text":44,"minutes":358,"time":359,"words":360},2.3,138000,460,{"_path":362,"title":363,"description":364,"date":365,"updated":365,"image":366,"categories":367,"recommend":13,"readingTime":368},"\u002F2025\u002Ftryhackme-ignite-writeup","TryHackMe - Ignite","In this article, we walk through solving TryHackMe's Ignite room step by step. We gain initial access to the system using a public exploit for a vulnerable version of Fuel CMS and then obtain root privileges by leveraging a reused password found in a database configuration file.","2025-08-25T14:27:41.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-ignite-writeup\u002Fthumbnail.jpg",[210],{"text":102,"minutes":369,"time":370,"words":371},1.65,99000,330,{"_path":373,"title":374,"description":375,"date":376,"updated":376,"image":377,"categories":378,"recommend":13,"readingTime":379},"\u002F2025\u002Ftryhackme-lazyadmin-writeup","TryHackMe - LazyAdmin","This article is a step-by-step walkthrough for the 'LazyAdmin' room on TryHackMe. It covers finding a vulnerable CMS to get initial access and then exploiting a misconfigured script for root privileges.","2025-08-20T08:34:58.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-lazyadmin-writeup\u002F1.jpg",[210],{"text":102,"minutes":380,"time":381,"words":382},1.995,119700,399,{"_path":384,"title":385,"description":386,"date":387,"updated":387,"image":388,"categories":389,"recommend":211,"readingTime":390},"\u002F2025\u002Ftryhackme-lianyu-writeup","TryHackMe - Lian Yu","A step-by-step walkthrough for the TryHackMe 'Lian Yu' room. This guide covers initial access by discovering hidden directories, decoding a Base58 password for FTP access, and using steganography to find SSH credentials. Privilege escalation is achieved by exploiting sudo rights on pkexec.","2025-09-01T14:54:37.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-lianyu-writeup\u002Fthumbnail.jpg",[210],{"text":102,"minutes":391,"time":392,"words":393},1.77,106200,354,{"_path":395,"title":396,"description":397,"date":398,"updated":398,"image":399,"categories":400,"tags":401,"recommend":211,"readingTime":403},"\u002F2025\u002Ftryhackme-mrrobot-writeup","TryHackMe - Mr.Robot","A detailed writeup for the TryHackMe Mr. Robot room. This walkthrough covers everything from initial reconnaissance and exploiting a WordPress site to gaining a root shell through privilege escalation.","2025-11-05T06:21:29.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-mrRobot-writeup\u002Fthumbnail.jpg",[210],[11,402],"Medium",{"text":44,"minutes":404,"time":405,"words":406},2.66,159600,532,{"_path":408,"title":409,"description":410,"date":411,"updated":411,"image":412,"categories":413,"recommend":211,"readingTime":414},"\u002F2025\u002Ftryhackme-mustacchio-writeup","TryHackMe - Mustacchio","A step-by-step walkthrough for the TryHackMe 'Mustacchio' room. This guide covers initial access via XXE injection and privilege escalation to root by exploiting a SUID binary with a PATH hijacking vulnerability.","2025-08-29T13:33:15.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-mustacchio-writeup\u002Fthumbnail.jpg",[210],{"text":15,"minutes":415,"time":416,"words":417},3.645,218700,729,{"_path":419,"title":420,"description":421,"date":422,"updated":422,"image":423,"categories":424,"recommend":13,"readingTime":425},"\u002F2025\u002Ftryhackme-overpass-writeup","TryHackMe - Overpass","This write-up details the process of compromising the \"Overpass\" machine, starting with bypassing a weak login function to steal an SSH key and escalating to root by exploiting a misconfigured scheduled task.","2025-08-21T12:23:20.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-overpass-writeup\u002Fthumbnail.jpg",[210],{"text":44,"minutes":426,"time":427,"words":428},2.385,143100,477,{"_path":430,"title":431,"description":432,"date":433,"updated":433,"image":434,"categories":435,"readingTime":436},"\u002F2025\u002Ftryhackme-publisher-writeup","TryHackMe - Publisher","A step-by-step guide on how to solve the TryHackMe 'Publisher' room. This write-up covers the initial foothold using a CVE in SPIP CMS and privilege escalation by bypassing AppArmor restrictions.","2025-10-23T16:16:07.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-publisher-writeup\u002Fthumbnail.jpg",[210],{"text":15,"minutes":437,"time":438,"words":439},3.215,192900,643,{"_path":441,"title":442,"description":443,"date":444,"updated":444,"image":445,"categories":446,"recommend":13,"readingTime":447},"\u002F2025\u002Ftryhackme-rootme-writeup","TryHackMe - RootMe","In this article, we will provide a step-by-step solution for the easy-level \"RootMe\" room on the TryHackMe platform, explaining the logic behind each step. Our goal is not just to copy and paste commands, but to understand why and how they work.","2025-08-17T15:35:03.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-rootme-writeup\u002F1.jpg",[210],{"text":213,"minutes":448,"time":449,"words":450},6.075,364500,1215,{"_path":452,"title":453,"description":454,"date":455,"updated":455,"image":456,"categories":457,"recommend":211,"readingTime":458},"\u002F2025\u002Ftryhackme-startup-writeup","TryHackMe - Startup","Step-by-step solution guide for the TryHackMe Startup room. In this article, discover how to gain initial access via a writable FTP service using PHP reverse shell, how to obtain user credentials by analysing PCAP with Wireshark, and how to gain root privileges by exploiting a misconfigured cron job.","2025-08-25T05:33:27.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-startup-writeup\u002Fthumbnail.jpg",[210],{"text":15,"minutes":459,"time":460,"words":461},3.585,215100,717,{"_path":463,"title":464,"description":465,"date":466,"updated":466,"image":467,"categories":468,"recommend":211,"readingTime":469},"\u002F2025\u002Ftryhackme-tomghost-writeup","TryHackMe - Tomghost","A step-by-step walkthrough for the TryHackMe Tomghost room. This write-up covers exploiting the Ghostcat vulnerability (CVE-2020-1938), cracking a PGP private key with John the Ripper, and escalating privileges to root via a sudo misconfiguration with zip.","2025-08-26T07:21:07.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-tomghost-writeup\u002Fthumbnail.jpg",[210],{"text":102,"minutes":470,"time":471,"words":472},1.545,92700,309,{"_path":474,"title":475,"description":476,"date":477,"updated":477,"image":478,"categories":479,"recommend":211,"readingTime":480},"\u002F2025\u002Ftryhackme-wgelctf-writeup","TryHackMe - Wgel CTF","A step-by-step walkthrough for the TryHackMe Wgel CTF room. This guide shows how to gain initial access via an exposed SSH key and escalate privileges to root by exploiting a wget sudo misconfiguration.","2025-08-27T11:42:45.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-wgelctf-writeup\u002Fthumbnail.jpg",[210],{"text":44,"minutes":481,"time":482,"words":483},2.115,126900,423,{"_path":485,"title":486,"description":487,"date":488,"updated":488,"image":489,"categories":490,"recommend":13,"readingTime":491},"\u002F2025\u002Ftryhackme-year-of-the-rabbit-writeup","TryHackMe - Year of the Rabbit","This article provides a detailed walkthrough for the 'Year of the Rabbit' room on TryHackMe. We'll start by uncovering hidden web pages and using BurpSuite to intercept traffic, leading us to credentials hidden within an image. From there, we'll gain initial access via FTP and finally escalate our privileges to root by exploiting a specific sudo vulnerability.","2025-09-03T15:56:06.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Ftryhackme-Year-of-the-Rabbit-writeup\u002Fthumbnail.jpg",[210],{"text":44,"minutes":492,"time":493,"words":494},2.935,176100,587,{"_path":496,"title":497,"description":498,"date":499,"updated":499,"image":500,"categories":501,"tags":502,"recommend":13,"readingTime":503},"\u002F2025\u002Fwhat-is-a-proxy","What is a Proxy?","In this article, we will talk about what a proxy is, what it does and what is its role in cyber security, and we will talk about examples with Burpsuite.","2025-08-07T08:58:18.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Fwhat-is-a-proxy\u002F1.jpg",[185],[],{"text":44,"minutes":504,"time":505,"words":506},2.04,122400,408,{"_path":508,"title":509,"description":510,"date":511,"updated":511,"image":512,"categories":513,"tags":514,"recommend":13,"readingTime":515},"\u002F2025\u002Fwhat-is-vlan-and-what-are-port-types","What is VLAN and What are Port Types?","In this article, we will discuss what VLAN is, how to assign a VLAN to a device, and VLAN security and attacks.","2025-08-08T13:24:23.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002FWhat-is-VLAN-and-What-are-Port-Types\u002Fthumbnail.jpg",[185],[],{"text":15,"minutes":516,"time":517,"words":518},3.935,236100,787,{"_path":520,"title":521,"description":522,"date":523,"updated":524,"categories":525,"tags":526,"readingTime":528},"\u002F2026\u002Faws-bulut-guvenligine-giris","AWS Bulut Güvenliğine Giriş: \"Başkasının Bilgisayarı\"nı Nasıl Korursunuz?","Bulut güvenliğinin temel dinamikleri, Paylaşılan Sorumluluk Modeli, Auto-Scaling güvenliği, IAM yetkilendirmesi ve çok daha fazlası...","2026-04-21T16:39:32.000Z","2026-04-23T07:35:00.000Z",[26],[28,527],"Security",{"text":529,"minutes":530,"time":531,"words":532},"6 min read",5.055,303300,1011,{"_path":534,"title":535,"description":536,"date":537,"updated":538,"categories":539,"tags":540,"readingTime":541},"\u002F2026\u002Faws-cloud-security-temelleri-iam-vpc-organizations","AWS Cloud Security Temelleri: IAM, VPC ve Organizations ile Güvenli Başlangıç","Bulut ihlallerinin %65'i yanlış IAM veya ağ yapılandırmasından kaynaklanıyor. AWS Root, SCP, STS ve VPC mimarisini güvenlik odaklı öğrenin.","2026-04-21T18:56:34.000Z","2026-04-23T07:40:00.000Z",[26],[28,527],{"text":529,"minutes":542,"time":543,"words":544},5.845,350700,1169,{"_path":546,"title":547,"description":548,"date":549,"updated":550,"image":551,"categories":552,"tags":553,"readingTime":555},"\u002F2026\u002Faws-iam-nedir-ve-bulut-guvenliginde-neden-ilk-savunma-hattidir","AWS IAM Nedir ve Bulut Güvenliğinde Neden İlk Savunma Hattıdır?","AWS IAM bileşenlerini, root risklerini, kullanıcı-rol farkını, policy mantığını, ARN yapısını ve Organizations ile hesap izolasyonunu keşfedin.","2026-04-22T07:00:00.000Z","2026-04-23T07:45:00.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-iam-nedir-ve-bulut-guvenliginde-neden-ilk-savunma-hattidir\u002F1.jpg",[26],[28,527,554],"IAM",{"text":529,"minutes":530,"time":531,"words":532},{"_path":557,"title":558,"description":559,"date":560,"updated":560,"image":561,"categories":562,"tags":563,"readingTime":565},"\u002F2026\u002Faws-iam-policy-yapisi-nasil-calisir","AWS IAM policy yapısı nasıl çalışır?","AWS IAM policy anatomisini, Effect önceliğini, Action ve Resource yazarken yapılan hataları ve Condition ile daraltmayı güncel istatistiklerle keşfedin.","2026-04-23T08:16:00.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-iam-policy-yapisi-nasil-calisir\u002F1.jpg",[26],[28,527,554,564],"JSON",{"text":213,"minutes":566,"time":567,"words":568},6.365,381900,1273,{"_path":570,"title":571,"description":572,"date":573,"updated":574,"image":575,"categories":576,"tags":577,"readingTime":578},"\u002F2026\u002Faws-iam-principal-nedir-kullanici-rol-ve-herkes-arasindaki-fark","AWS IAM Principal Nedir? Kullanıcı, Rol ve Herkes Arasındaki Fark","AWS IAM principal türlerini, geçici ve kalıcı erişim farklarını, root hesabının risklerini ve federasyon mimarisini istatistiklerle öğrenin.","2026-04-22T08:00:00.000Z","2026-04-23T07:50:00.000Z","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-iam-principal-nedir-kullanici-rol-ve-herkes-arasindaki-fark\u002F1.jpg",[26],[28,527,554],{"text":31,"minutes":579,"time":580,"words":581},4.96,297600,992,{"_path":583,"title":584,"description":585,"image":586,"date":587,"updated":587,"categories":588,"tags":589,"readingTime":591},"\u002F2026\u002Faws-resource-policy-ve-scp-farki","AWS Resource Policy ve SCP Farkı Nedir? Güvenlik Açısından Bilmen Gerekenler","AWS güvenliğinde resource-based policy ve Service Control Policy (SCP) arasındaki kritik farklar, 2025-2026 güncel verileri ve yanlış yapılandırma riskleri.","https:\u002F\u002Fhackpaper-image-server.pages.dev\u002Fimages\u002Fblogs\u002Faws-resource-policy-ve-scp-farki\u002F1.jpg","2026-04-24T07:37:42.000Z",[26],[28,527,554,590],"SCP",{"text":31,"minutes":592,"time":593,"words":594},4.355,261300,871,1777022957129]