Loading...

ARKA KAPI

BIMONTHLY CYBER SECURITY MAGAZINE

ABOUT US

Imagination is more important than knowledge. For knowledge is limited, whereas imagination embraces the entire world, stimulating progress, giving birth to evolution.

Albert Einstein

ISSUES

  • Set up your VPN with My Connection
  • Introduction to Cryptology
  • Chain of Independence: Blockchain
  • Revolutionary Blockchain Technology: Is it safe?
  • Thoughts on Meltdown and Spectre Vulnerabilities
  • Vulnerabilities of Bluetooth: Past and Future
  • Why you shouldn’t store sensitive data in javascript files
  • The art of Data Hiding: STEGANOGRAPHY
  • Acting on the Sly: Overcome Obstacles with DNS Tunnelling
  • Possession is Nine-Tenths of the Law: User Agreements
  • The King’s Naked: Constraints of Blockchain
  • Signal Intelligence: Methods of Signal Listening and Analysis
  • How to be a shareholder of Google: Double your income with Google Adsense
  • Anonymizing Internet from the Router with OpenWrt and TOR
  • Cyber Security Conferences – Ayşenur Burak
  • WiPi Hunter Detecting – Besim Altınok
  • Web Application Firewall (WAF) Bypassing Methods – Ulaş Fırat Özdemir
  • Taking Control of Admin Account on Active Directory using the DCC – Girayhan Menekay
  • Dynamic Host Configuration to Root – Barkın Kılıç
  • Offensive Touch to Defensive World – Halil Dalabasmaz
  • Simone Margaritelli Interview – Utku Şen
  • Denial of Service – Bener Kaya
  • A Young Hacker in the Corridors of a Holding at Midnight – Yusuf Şahin
  • Revolutionary Blockchain Technology – Mustafa Yalçın
  • How I hacked into a college’s website! – Aditya Anand
  • Meltdown, Spectre and Foreshadow – Chris Stephenson
  • The Dangers of Wireless Networks – Besim Altınok
  • Cyber Security Conferences – Ayşenur Burak
  • Cryptology In Industrial Revolution – Bayram Gök
  • The 10 Biggest Hacks Of 2018 – Arka Kapi Magazine
  • Back To The Old Tech: Offline Communication Networks And Security – Utku Şen
  • Waf Bypassing Methods Part 2: Tricks And Indirect Access – Ulaş Firat Özdemir
  • Mini Threat Intelligence – Mert Sarica
  • Krack (Key Reinstallation Attack) – Ulaş Firat Özdemir
  • Daniel Bohannon Interview – Utku Şen
  • The Role And Comparison Of Operating Systems In Mass Surveillance (Qubes Os, Tails Os, Subgraph Os) – Furkan Senan
  • The Ss7 Protocol And Potential Dangers In Gsm Networks – Murat Şişman
  • Aprs: What Is It, What Does It Do And How To Use It – Murat Kaygisiz
  • Key Exchange Problem In Public Key Cryptography And Keybase – Recep Kizilarslan
  • Oldest Of The Hackers I – Bill Gosper – Cansu Topukçu
  • Technical Constraints Of The Blockchain Projects – Mert Susur
  • Cyber Security Conferences – Ayşenur Burak
  • The Future Of Security And Reliability – Chris Stephenson
  • Cryptology Front Of World War Ii The Enigma Encryption Machine – Bayram Gök
  • Secret Sharing Systems – Ceren İnce
  • Database Attacks And Protection Methods – Ömer Faruk Colakoğlu
  • Malware Programming And Lockdown Virus – Bener Kaya
  • Network Programming With Scapy – Güray Yıldırım
  • Siber Yildiz 2019 Writeup – Esra Nur Soylu
  • A Security Guide For Your Android Device – Arka Kapı
  • Signal Intelligence Signal Listening And Analysis Methods – Murat Şişman
  • Julian Assange – Cansu Topukçu
  • Cyber Security Conferences – Ayşenur Burak
  • Sigintos – Murat Şişman 8 Network Packet Programming Ii – The Python Scapy Library – Güray Yıldırım
  • Google Vs. Authy Security Wars In 2fa – Ulaş Fırat Özdemir
  • When “random” Numbers Aren’t Really Random – Chris Stephenson
  • Ipfs (Interplanetary File System) With Permanent Web – Mustafa Yalçın
  • No Room For Antiviruses In The Future – Utku Şen
  • Password Cracking Attacks In Wireless Networks – Besim Altınok
  • Blockchain Applications And Security Problems – Mert Susur
  • Birthday Attack To Hash Functions- Halit İnce
  • Cryptology In The 20th Century: The Electronic Age – Bayram Gök
  • Cryptocurrency Monero (Xmr) For Those Who Want True Privacy – Arka Kapı
  • Cyber Security Conferences – Ayşenur Burak
  • Copyright Projects Based On Blockchain Technology – Mihraç Cerrahoğlu
  • Make Your Own Messaging Application With Signal – Murat Şişman
  • Great Threat In Eduroam Academic Networks – Besim Altinok
  • The Ship That Got Hacked Ashore – Esref Erol
  • Client-Side Static Analysis In Web Applications – Mithat Gogebakan
  • Encrypt Your Disks With Bitlocker – Arka Kapı
  • Oldest Of The Hackers Ii – Richard Greenblatt – Cansu Topukçu
  • Our Fellow Confidant, RSA – Bayram Gök
  • Prophecies For The Next 30 Years Of Cybersecurity – Utku Şen
  • Cyber Security Conferences – Ayşenur Burak
  • Out-Of-Band Attacks – Ömer Çıtak
  • Leave No Trace Behind – Tails (The Amnesic Incognito Live System) – Ziyahan Albeniz
  • Source Code Review For Python – Caner Özden
  • Stay Hidden On The Internet: The Onion Router – M. Enes Özen
  • Manage Your Passwords In One Place: Keepassxc Key To The Empire Passwords! – Arka Kapı
  • Balance Of Good And Bad In Cybersecurity – Utku Şen
  • Being Free In The Open World – Nuri Çilengir
  • CYBER SECURITY CONFERENCES – Ayşenur Burak
  • DIGITAL SECURITY FOR JOURNALISTS – Alper Atmaca
  • DEVICE MONITORING WITH OSQUERY AND AWS LOGGING – Güray Yıldırım & Aykut Yılmaz
  • HOMEMADE CYBER THREAT INTELLIGENCE – Mert Sarıca
  • CYBER SECURITY IN CRITICAL INFRASTRUCTURES – Erhan Yakut
  • THROUGH THE EYES OF A COMPUTER FORENSICS ANALYST: WINDOWS FORENSICS – İbrahim Baloğlu
  • GATHERING INTELLIGENCE WITH MALTEGO – Ata Şahan Erdemir
  • HUNTING THE BANS IN FANTASIA – HOW TO OPEN A WEBSITE IN THE TOR NETWORK – Ziyahan Albeniz

SUBSCRIPTION


Latest Blogposts See All Blogposts

Leave No Trace Behind : Tails (The Amnesic Incognito Live System)
16 December 2019   Ziyahan Albeniz  
Leave No Trace Behind : Tails (The Amnesic Incognito Live System) Years ago, at a holiday, I had to access my emails and desperately asked a stranger using a computer to borrow their device for few minutes. Quickly checking my emails, I thanked that stranger but was numerous questions were left behind in my mind […]
READ MORE
Stay Hidden on the Internet: The Onion Router
12 November 2019   M. Enes Özen  
Stay Hidden on the Internet: The Onion Router   TOR (The Onion Router) is both a network and a browser that allows people to surf the internet anonymously, allowing them to overcome barriers in regions and countries where internet access is blocked or restricted. TOR was originally developed by the United States Naval Research LaboraTORy […]
READ MORE
Why You Shouldn’t Store Sensitive Data in JavaScript Files
1 December 2018   Sven Morgenroth  
Why You Shouldn’t Store Sensitive Data in JavaScript Files It’s been known for many years that storing sensitive data in JavaScript files is not only a bad practice, but also a rather dangerous one. The reason for that is relatively simple. Let’s assume that you dynamically generate a JavaScript file containing the API key of […]
READ MORE

CONTACT

TELEPHONE
+90 212 514 68 61
ADDRESS
Hobyar Mah. Cemal Nadir Sok. No:24/178 Cağaloğlu Istanbul/Turkey

SPONSORS