Want To Be A Pentester ?

  1. Web Application Security:
  1. Network Security:
  1. Code Review:
  1. Binary Reverse Engineering:
  1. Hardware / Embedded Devices Security:
  1. Physical Security:
  1. Mobile Security:

--

--

--

Sr.Penetration Tester | Ethical Hacker | MBA | OSCP | OSWP | eMAPT | CEH Master | TSE-STU Offensive Security Engineer at Turk Telekom / Synack

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

CIDR Addressing and Subnet Masking On IP Networks (Part I)

A Brief Look At 2 IdaaS Attack Paths

The Week In Review: April 22nd, 2022

What are the Benefits of a Post-Quantum Encrypted VPN

Serverless Threat Modelling Part 3 🚀

HOW BUSINESS CAN ENSURE ONLINE SAFETY WHILE WORKING FROM HOME

PolkaCover Strongholder Rewards

M1 vulnerability downplayed by Apple 🍎

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ömür Uğur

Ömür Uğur

Sr.Penetration Tester | Ethical Hacker | MBA | OSCP | OSWP | eMAPT | CEH Master | TSE-STU Offensive Security Engineer at Turk Telekom / Synack

More from Medium

Chasing my true passion: Hacking

Stepping in the Unknown

FLASH POINT

“Is that a laptop ?”