Ahmet Numan Aytemiz’s Blogs and Labs
Rest Api Pentest Notes
- Introduction-SQL Injection-Sensitive Data in Get Request
- Weak Authentication Token and IDOR
- Sensitive Data in Response (Password) and Clear Text Storage
- Reading API Documentation
Vulnerabilites and Exploits
High Availability of Various Vendors
- Palo Alto Firewall HA Overview
- Palo Alto Firewall HA Active/Passive Lab
- Fortigate Firewall HA Overview
- Fortigate Firewall Active/Passive HA Lab
Docker
- Docker For Beginners
- Basic Docker Commands
- Basic Docker Commands Lab
- Docker Run
- Docker Run Lab
- Docker Images
- Docker Images Lab
F5 LTM
F5 APM
F5-BigIP - Kubernetes Integration
- Installing Docker
- Installing Kubernetes Cluster
- Installing F5 Container Ingress Service
- F5 Container Connector Usage
Suricata
- Installing Suricata on Ubuntu 18.04
- Capture First Packet With Suricata
- Installing Emerging Threats Rule
- Evaluating Suricata Output
- Custom HTTP Logging
Palo Alto Firewall
Palo Alto Getting Started
- Introduction to Firewall
- Palo Alto Next Generation Firewall
- Initializing Palo Alto Firewall
- Lab Intro
- Intializing Palo Alto Firewall
- Web Gui and Management Settings
- Configuration Management
- Admin Account Overview
- Administrator Accounts
- Security Zone and Interface Management
- Layer 3 Interface Setup
- Virtual Routers Overview
- Enable Intrazone and Interzone Rules Log
- Security Policy