<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <id>https://hackpaper.com/</id>
  <title>HackPaper</title>
  <updated>2026-04-22T16:26:25.272Z</updated>
  <description>HackPaper; Cloud Security, DevSecOps ve Cloud Pentest alanlarında derinlemesine teknik içgörüler sunan öncü bir platformdur. AWS, Azure ve GCP mimarileri üzerinde güvenli altyapı tasarımı, gelişmiş saldırı vektörleri ve güvenlik otomasyonlarına odaklanır. Mobil uyumlu ve hızlı arayüzüyle her cihazdan erişilebilir olan HackPaper, modern bulut ortamlarını güvene almak ve teknik yetkinliğini artırmak isteyenler için özgün ve nitelikli bir kaynaktır.</description>
  <author>
    <name>Ali Sünbül</name>
    <uri>https://hackpaper.com/</uri>
  </author>
  <link href="https://hackpaper.com/atom.xml" rel="self"></link>
  <link href="https://hackpaper.com/" rel="alternate"></link>
  <language>en-US</language>
  <icon>https://hackpaper-image-server.netlify.app/images/website/hackpaper_logo.jpg</icon>
  <logo>https://avatars.githubusercontent.com/u/173461547?v=4</logo>
  <rights>© 2026 Ali Sünbül</rights>
  <subtitle>Architect - Cloud Security - Pentest</subtitle>
  <entry>
    <id>https://hackpaper.com/2026/aws-iam-principal-nedir-kullanici-rol-ve-herkes-arasindaki-fark</id>
    <title>AWS IAM Principal Nedir? Kullanıcı, Rol ve Herkes Arasındaki Fark</title>
    <updated>2026-04-22T08:00:00.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-iam-principal-nedir-kullanici-rol-ve-herkes-arasindaki-fark/1.jpg" /> <p>AWS IAM principal türlerini, geçici ve kalıcı erişim farklarını, root hesabının risklerini ve federasyon mimarisini istatistiklerle öğrenin.</p> <a href="https://hackpaper.com/2026/aws-iam-principal-nedir-kullanici-rol-ve-herkes-arasindaki-fark">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2026/aws-iam-principal-nedir-kullanici-rol-ve-herkes-arasindaki-fark"></link>
    <summary>AWS IAM principal türlerini, geçici ve kalıcı erişim farklarını, root hesabının risklerini ve federasyon mimarisini istatistiklerle öğrenin.</summary>
    <category term="Cloud"></category>
    <published>2026-04-22T08:00:00.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2026/aws-iam-nedir-ve-bulut-guvenliginde-neden-ilk-savunma-hattidir</id>
    <title>AWS IAM Nedir ve Bulut Güvenliğinde Neden İlk Savunma Hattıdır?</title>
    <updated>2026-04-22T07:00:00.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-iam-nedir-ve-bulut-guvenliginde-neden-ilk-savunma-hattidir/1.jpg" /> <p>AWS IAM bileşenlerini, root risklerini, kullanıcı-rol farkını, policy mantığını, ARN yapısını ve Organizations ile hesap izolasyonunu keşfedin.</p> <a href="https://hackpaper.com/2026/aws-iam-nedir-ve-bulut-guvenliginde-neden-ilk-savunma-hattidir">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2026/aws-iam-nedir-ve-bulut-guvenliginde-neden-ilk-savunma-hattidir"></link>
    <summary>AWS IAM bileşenlerini, root risklerini, kullanıcı-rol farkını, policy mantığını, ARN yapısını ve Organizations ile hesap izolasyonunu keşfedin.</summary>
    <category term="Cloud"></category>
    <published>2026-04-22T07:00:00.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2026/aws-cloud-security-temelleri-iam-vpc-organizations</id>
    <title>AWS Cloud Security Temelleri: IAM, VPC ve Organizations ile Güvenli Başlangıç</title>
    <updated>2026-04-21T18:56:34.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<p>Bulut ihlallerinin %65&#39;i yanlış IAM veya ağ yapılandırmasından kaynaklanıyor. AWS Root, SCP, STS ve VPC mimarisini güvenlik odaklı öğrenin.</p> <a href="https://hackpaper.com/2026/aws-cloud-security-temelleri-iam-vpc-organizations">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2026/aws-cloud-security-temelleri-iam-vpc-organizations"></link>
    <summary>Bulut ihlallerinin %65&amp;#39;i yanlış IAM veya ağ yapılandırmasından kaynaklanıyor. AWS Root, SCP, STS ve VPC mimarisini güvenlik odaklı öğrenin.</summary>
    <category term="Cloud"></category>
    <published>2026-04-21T18:56:34.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2026/aws-bulut-guvenligine-giris</id>
    <title>AWS Bulut Güvenliğine Giriş: &quot;Başkasının Bilgisayarı&quot;nı Nasıl Korursunuz?</title>
    <updated>2026-04-21T16:39:32.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<p>Bulut güvenliğinin temel dinamikleri, Paylaşılan Sorumluluk Modeli, Auto-Scaling güvenliği, IAM yetkilendirmesi ve çok daha fazlası...</p> <a href="https://hackpaper.com/2026/aws-bulut-guvenligine-giris">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2026/aws-bulut-guvenligine-giris"></link>
    <summary>Bulut güvenliğinin temel dinamikleri, Paylaşılan Sorumluluk Modeli, Auto-Scaling güvenliği, IAM yetkilendirmesi ve çok daha fazlası...</summary>
    <category term="Cloud"></category>
    <published>2026-04-21T16:39:32.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-iyi-mimari-icin-hizmetler</id>
    <title>13 - AWS İyi Mimari için Hizmetler</title>
    <updated>2025-11-26T19:04:47.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-iyi-mimari-icin-hizmetler/1.jpg" /> <p>Farklı kullanım alanlarına yönelik AWS servisleri (Dev, IoT, EUC) ve ideal bulut mimarisi oluşturmak için kullanılan Well-Architected çerçevesi hakkında temel bilgiler.</p> <a href="https://hackpaper.com/2025/aws-iyi-mimari-icin-hizmetler">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-iyi-mimari-icin-hizmetler"></link>
    <summary>Farklı kullanım alanlarına yönelik AWS servisleri (Dev, IoT, EUC) ve ideal bulut mimarisi oluşturmak için kullanılan Well-Architected çerçevesi hakkında temel bilgiler.</summary>
    <category term="Cloud"></category>
    <published>2025-11-26T19:04:47.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-goc-ve-modernizasyon</id>
    <title>12 - AWS Göç ve Modernizasyon (Migration &amp; Modernization)</title>
    <updated>2025-11-26T18:27:46.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-go%C3%A7-ve-modernizasyon/1.jpg" /> <p>Bu yazı, AWS&#39;ye geçiş süreçleri, stratejileri, kullanılan araçlar ve temel çerçeveleri kapsamaktadır.</p> <a href="https://hackpaper.com/2025/aws-goc-ve-modernizasyon">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-goc-ve-modernizasyon"></link>
    <summary>Bu yazı, AWS&amp;#39;ye geçiş süreçleri, stratejileri, kullanılan araçlar ve temel çerçeveleri kapsamaktadır.</summary>
    <category term="Cloud"></category>
    <published>2025-11-26T18:27:46.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-maliyet-yonetimi-ve-destek-hizmetleri</id>
    <title>11 - AWS Maliyet Yönetimi ve Destek Hizmetleri</title>
    <updated>2025-11-26T17:49:48.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-maliyet-yonetimi-ve-destek-hizmetleri/1.jpg" /> <p>AWS maliyet yönetimi, destek planları ve tasarruf stratejileri üzerine notlar.</p> <a href="https://hackpaper.com/2025/aws-maliyet-yonetimi-ve-destek-hizmetleri">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-maliyet-yonetimi-ve-destek-hizmetleri"></link>
    <summary>AWS maliyet yönetimi, destek planları ve tasarruf stratejileri üzerine notlar.</summary>
    <category term="Cloud"></category>
    <published>2025-11-26T17:49:48.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-bulut-yonetimi-temel-ilkeler-ve-hizmetler</id>
    <title>10 - AWS Bulut Yönetimi: Temel İlkeler ve Hizmetler</title>
    <updated>2025-11-26T12:09:18.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-bulut-yonetimi-temel-ilkeler-ve-hizmetler/2.jpg" /> <p>AWS bulut altyapısında güvenlik, izleme, denetim ve uyumluluk süreçlerini yönetmek için kullanılan temel hizmetler (CloudWatch, CloudTrail, Config, Organizations) ve yönetim ilkeleri.</p> <a href="https://hackpaper.com/2025/aws-bulut-yonetimi-temel-ilkeler-ve-hizmetler">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-bulut-yonetimi-temel-ilkeler-ve-hizmetler"></link>
    <summary>AWS bulut altyapısında güvenlik, izleme, denetim ve uyumluluk süreçlerini yönetmek için kullanılan temel hizmetler (CloudWatch, CloudTrail, Config, Organizations) ve yönetim ilkeleri.</summary>
    <category term="Cloud"></category>
    <published>2025-11-26T12:09:18.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-security</id>
    <title>9 - AWS Security</title>
    <updated>2025-11-26T11:24:28.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-security/2.jpg" /> <p>Bu yazıda, AWS üzerindeki kimlik yönetimi, ağ koruması, şifreleme ve tehdit algılama hizmetlerine dair temel kavramları ve hizmetleri inceleyeceğiz.</p> <a href="https://hackpaper.com/2025/aws-security">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-security"></link>
    <summary>Bu yazıda, AWS üzerindeki kimlik yönetimi, ağ koruması, şifreleme ve tehdit algılama hizmetlerine dair temel kavramları ve hizmetleri inceleyeceğiz.</summary>
    <category term="Cloud"></category>
    <published>2025-11-26T11:24:28.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-ai-ml-ve-veri-analitigi</id>
    <title>8 - AWS AI/ML ve Veri Analitiği</title>
    <updated>2025-11-26T08:40:07.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-ai-ml-ve-veri-analiti%C4%9Fi/1.jpg" /> <p>Bu yazı, Yapay Zeka (AI), Makine Öğrenimi (ML), Üretken Yapay Zeka (GenAI) ve AWS üzerindeki Veri Analitiği süreçlerini kapsamaktadır.</p> <a href="https://hackpaper.com/2025/aws-ai-ml-ve-veri-analitigi">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-ai-ml-ve-veri-analitigi"></link>
    <summary>Bu yazı, Yapay Zeka (AI), Makine Öğrenimi (ML), Üretken Yapay Zeka (GenAI) ve AWS üzerindeki Veri Analitiği süreçlerini kapsamaktadır.</summary>
    <category term="Cloud"></category>
    <published>2025-11-26T08:40:07.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-databases</id>
    <title>7 - AWS Veritabanı Hizmetleri</title>
    <updated>2025-11-26T07:39:08.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-databases/1.jpg" /> <p>AWS, geleneksel ilişkisel veritabanlarından gelişmiş NoSQL ve bellek içi çözümlere kadar geniş bir yelpazede, tamamen yönetilen (fully managed) veritabanı hizmetleri sunar. Bu yazımızda bu hizmetleri inceleyeceğiz.</p> <a href="https://hackpaper.com/2025/aws-databases">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-databases"></link>
    <summary>AWS, geleneksel ilişkisel veritabanlarından gelişmiş NoSQL ve bellek içi çözümlere kadar geniş bir yelpazede, tamamen yönetilen (fully managed) veritabanı hizmetleri sunar. Bu yazımızda bu hizmetleri inceleyeceğiz.</summary>
    <category term="Cloud"></category>
    <published>2025-11-26T07:39:08.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-storage</id>
    <title>6 - AWS Depolama Hizmetleri</title>
    <updated>2025-11-26T06:24:24.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-storage/1.jpg" /> <p>AWS&#39;de veri depolamak için üç temel yöntem bulunur: Blok, Nesne ve Dosya depolama. Her biri farklı performans gereksinimleri ve kullanım senaryoları için tasarlanmıştır.</p> <a href="https://hackpaper.com/2025/aws-storage">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-storage"></link>
    <summary>AWS&amp;#39;de veri depolamak için üç temel yöntem bulunur: Blok, Nesne ve Dosya depolama. Her biri farklı performans gereksinimleri ve kullanım senaryoları için tasarlanmıştır.</summary>
    <category term="Cloud"></category>
    <published>2025-11-26T06:24:24.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-networking</id>
    <title>5 - AWS Networking (Ağ Hizmetleri)</title>
    <updated>2025-11-25T11:16:00.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-networking/thumbail.jpg" /> <p>Bu cheatsheet, AWS ağ temelleri, güvenlik katmanları, bağlantı yöntemleri ve küresel ağ servisleri hakkında genel bir bakış sunar.</p> <a href="https://hackpaper.com/2025/aws-networking">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-networking"></link>
    <summary>Bu cheatsheet, AWS ağ temelleri, güvenlik katmanları, bağlantı yöntemleri ve küresel ağ servisleri hakkında genel bir bakış sunar.</summary>
    <category term="Cloud"></category>
    <published>2025-11-25T11:16:00.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-kuresel-altyapisi-ve-olceklenebilirlik</id>
    <title>4 - AWS Küresel Altyapısı ve Ölçeklenebilirlik</title>
    <updated>2025-11-24T18:37:05.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-k%C3%BCresel-altyap%C4%B1s%C4%B1-ve-%C3%B6l%C3%A7eklenebilirlik/thumbnail.jpg" /> <p>AWS üzerinde küresel bir yapı kurmak, kaynakların stratejik dağıtımını, hizmet hızını ve standartlaştırılmış kurulumları yönetmeyi gerektirir.</p> <a href="https://hackpaper.com/2025/aws-kuresel-altyapisi-ve-olceklenebilirlik">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-kuresel-altyapisi-ve-olceklenebilirlik"></link>
    <summary>AWS üzerinde küresel bir yapı kurmak, kaynakların stratejik dağıtımını, hizmet hızını ve standartlaştırılmış kurulumları yönetmeyi gerektirir.</summary>
    <category term="Cloud"></category>
    <published>2025-11-24T18:37:05.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-compute-hizmetlerini-kesfetme</id>
    <title>3 - AWS Hesaplama (Compute) Hizmetlerini Keşfetme</title>
    <updated>2025-11-24T12:01:59.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-compute-hizmetlerini-ke%C5%9Ffetme/10.jpg" /> <p>Bu yazı, AWS üzerindeki hesaplama modellerini, sunucusuz (serverless) mimarileri, konteyner yönetimini ve belirli iş yükleri için özelleştirilmiş diğer hesaplama hizmetlerini kapsar.</p> <a href="https://hackpaper.com/2025/aws-compute-hizmetlerini-kesfetme">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-compute-hizmetlerini-kesfetme"></link>
    <summary>Bu yazı, AWS üzerindeki hesaplama modellerini, sunucusuz (serverless) mimarileri, konteyner yönetimini ve belirli iş yükleri için özelleştirilmiş diğer hesaplama hizmetlerini kapsar.</summary>
    <category term="Cloud"></category>
    <published>2025-11-24T12:01:59.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-ec2-ve-temel-servisler</id>
    <title>2 - Amazon EC2 ve Temel Servisler</title>
    <updated>2025-11-23T16:44:46.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-ec2-ve-temel-servisler/11.jpg" /> <p>Bu yazı, AWS&#39;in temel yapı taşı olan EC2 (Elastic Compute Cloud), fiyatlandırma modelleri, ölçeklendirme, uygulama mimarisi ve temel servisler konularını kapsar.</p> <a href="https://hackpaper.com/2025/aws-ec2-ve-temel-servisler">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-ec2-ve-temel-servisler"></link>
    <summary>Bu yazı, AWS&amp;#39;in temel yapı taşı olan EC2 (Elastic Compute Cloud), fiyatlandırma modelleri, ölçeklendirme, uygulama mimarisi ve temel servisler konularını kapsar.</summary>
    <category term="Cloud"></category>
    <published>2025-11-23T16:44:46.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/aws-ve-bulut-bilisim-temelleri</id>
    <title>1 - AWS ve Bulut Bilişim Temelleri</title>
    <updated>2025-11-22T13:33:47.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/aws-ve-bulut-bili%C5%9Fim-temelleri/10.jpg" /> <p>AWS ve bulut bilişim temel kavramlarını, AWS&#39;nin sunduğu avantajları ve küresel altyapısını anlatan giriş niteliğinde bir rehber.</p> <a href="https://hackpaper.com/2025/aws-ve-bulut-bilisim-temelleri">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/aws-ve-bulut-bilisim-temelleri"></link>
    <summary>AWS ve bulut bilişim temel kavramlarını, AWS&amp;#39;nin sunduğu avantajları ve küresel altyapısını anlatan giriş niteliğinde bir rehber.</summary>
    <category term="Cloud"></category>
    <published>2025-11-22T13:33:47.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-mrrobot-writeup</id>
    <title>TryHackMe - Mr.Robot</title>
    <updated>2025-11-05T06:21:29.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-mrRobot-writeup/thumbnail.jpg" /> <p>A detailed writeup for the TryHackMe Mr. Robot room. This walkthrough covers everything from initial reconnaissance and exploiting a WordPress site to gaining a root shell through privilege escalation.</p> <a href="https://hackpaper.com/2025/tryhackme-mrrobot-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-mrrobot-writeup"></link>
    <summary>A detailed writeup for the TryHackMe Mr. Robot room. This walkthrough covers everything from initial reconnaissance and exploiting a WordPress site to gaining a root shell through privilege escalation.</summary>
    <category term="CTF"></category>
    <published>2025-11-05T06:21:29.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/htb-artificial-writeup</id>
    <title>HTB - Artificial</title>
    <updated>2025-10-29T11:40:48.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/htb-artificial-writeup/thumbnail.jpg" /> <p>A detailed writeup on how to solve the Hack The Box &#39;Artificial&#39; machine. This post covers gaining initial access through a TensorFlow model RCE, escalating privileges to the &#39;gael&#39; user by cracking a password found in a database, and finally achieving root access by exploiting a &#39;backrest&#39; backup service to retrieve the root user&#39;s SSH key.</p> <a href="https://hackpaper.com/2025/htb-artificial-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/htb-artificial-writeup"></link>
    <summary>A detailed writeup on how to solve the Hack The Box &amp;#39;Artificial&amp;#39; machine. This post covers gaining initial access through a TensorFlow model RCE, escalating privileges to the &amp;#39;gael&amp;#39; user by cracking a password found in a database, and finally achieving root access by exploiting a &amp;#39;backrest&amp;#39; backup service to retrieve the root user&amp;#39;s SSH key.</summary>
    <category term="CTF"></category>
    <published>2025-10-29T11:40:48.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/htb-cap-writeup</id>
    <title>HTB - Cap</title>
    <updated>2025-10-27T15:49:55.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/htb-cap-writeup/thumbnail.jpg" /> <p>A step-by-step guide on how to solve the Hack The Box &#39;Cap&#39; machine. This write-up covers the initial foothold by analyzing a pcap file to find FTP credentials and privilege escalation by exploiting python capabilities.</p> <a href="https://hackpaper.com/2025/htb-cap-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/htb-cap-writeup"></link>
    <summary>A step-by-step guide on how to solve the Hack The Box &amp;#39;Cap&amp;#39; machine. This write-up covers the initial foothold by analyzing a pcap file to find FTP credentials and privilege escalation by exploiting python capabilities.</summary>
    <category term="CTF"></category>
    <published>2025-10-27T15:49:55.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-publisher-writeup</id>
    <title>TryHackMe - Publisher</title>
    <updated>2025-10-23T16:16:07.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-publisher-writeup/thumbnail.jpg" /> <p>A step-by-step guide on how to solve the TryHackMe &#39;Publisher&#39; room. This write-up covers the initial foothold using a CVE in SPIP CMS and privilege escalation by bypassing AppArmor restrictions.</p> <a href="https://hackpaper.com/2025/tryhackme-publisher-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-publisher-writeup"></link>
    <summary>A step-by-step guide on how to solve the TryHackMe &amp;#39;Publisher&amp;#39; room. This write-up covers the initial foothold using a CVE in SPIP CMS and privilege escalation by bypassing AppArmor restrictions.</summary>
    <category term="CTF"></category>
    <published>2025-10-23T16:16:07.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-couch-writeup</id>
    <title>TryHackMe - Couch</title>
    <updated>2025-10-22T06:11:23.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-couch-writeup/thumbnail.jpg" /> <p>This post provides a step-by-step write-up for the TryHackMe &#39;Couch&#39; room. Learn how to find credentials in a CouchDB database and escalate privileges to root by leveraging an insecure Docker port.</p> <a href="https://hackpaper.com/2025/tryhackme-couch-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-couch-writeup"></link>
    <summary>This post provides a step-by-step write-up for the TryHackMe &amp;#39;Couch&amp;#39; room. Learn how to find credentials in a CouchDB database and escalate privileges to root by leveraging an insecure Docker port.</summary>
    <category term="CTF"></category>
    <published>2025-10-22T06:11:23.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-archangel-writeup</id>
    <title>TryHackMe - Archangel</title>
    <updated>2025-09-08T17:50:48.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-archangel-writeup/thumbnail.jpg" /> <p>A detailed writeup on the TryHackMe Archangel room. This walkthrough covers exploiting a Local File Inclusion (LFI) vulnerability to gain initial access through Apache log poisoning, and escalating privileges to root via a cronjob and PATH hijacking.</p> <a href="https://hackpaper.com/2025/tryhackme-archangel-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-archangel-writeup"></link>
    <summary>A detailed writeup on the TryHackMe Archangel room. This walkthrough covers exploiting a Local File Inclusion (LFI) vulnerability to gain initial access through Apache log poisoning, and escalating privileges to root via a cronjob and PATH hijacking.</summary>
    <category term="CTF"></category>
    <published>2025-09-08T17:50:48.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-gamingserver-writeup</id>
    <title>TryHackMe - GamingServer</title>
    <updated>2025-09-05T08:18:55.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-GamingServer-writeup/thumbnail.jpg" /> <p>A step-by-step guide to completing the TryHackMe GamingServer room. This walkthrough covers reconnaissance, gaining initial access, and escalating privileges using the LXD vulnerability.</p> <a href="https://hackpaper.com/2025/tryhackme-gamingserver-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-gamingserver-writeup"></link>
    <summary>A step-by-step guide to completing the TryHackMe GamingServer room. This walkthrough covers reconnaissance, gaining initial access, and escalating privileges using the LXD vulnerability.</summary>
    <category term="CTF"></category>
    <published>2025-09-05T08:18:55.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-b3dr0ck-writeup</id>
    <title>TryHackMe - b3dr0ck</title>
    <updated>2025-09-04T15:20:00.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-b3dr0ck-writeup/thumbnail.jpg" /> <p>A step-by-step guide to solving the b3dr0ck room on TryHackMe.</p> <a href="https://hackpaper.com/2025/tryhackme-b3dr0ck-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-b3dr0ck-writeup"></link>
    <summary>A step-by-step guide to solving the b3dr0ck room on TryHackMe.</summary>
    <category term="CTF"></category>
    <published>2025-09-04T15:20:00.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-year-of-the-rabbit-writeup</id>
    <title>TryHackMe - Year of the Rabbit</title>
    <updated>2025-09-03T15:56:06.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-Year-of-the-Rabbit-writeup/thumbnail.jpg" /> <p>This article provides a detailed walkthrough for the &#39;Year of the Rabbit&#39; room on TryHackMe. We&#39;ll start by uncovering hidden web pages and using BurpSuite to intercept traffic, leading us to credentials hidden within an image. From there, we&#39;ll gain initial access via FTP and finally escalate our privileges to root by exploiting a specific sudo vulnerability.</p> <a href="https://hackpaper.com/2025/tryhackme-year-of-the-rabbit-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-year-of-the-rabbit-writeup"></link>
    <summary>This article provides a detailed walkthrough for the &amp;#39;Year of the Rabbit&amp;#39; room on TryHackMe. We&amp;#39;ll start by uncovering hidden web pages and using BurpSuite to intercept traffic, leading us to credentials hidden within an image. From there, we&amp;#39;ll gain initial access via FTP and finally escalate our privileges to root by exploiting a specific sudo vulnerability.</summary>
    <category term="CTF"></category>
    <published>2025-09-03T15:56:06.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-fowsniff-writeup</id>
    <title>TryHackMe - Fowsniff CTF</title>
    <updated>2025-09-02T07:57:20.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-fowsniff-writeup/thumbnail.jpg" /> <p>A full writeup for the TryHackMe Fowsniff CTF. Learn how to go from leaked credentials to root access by cracking MD5 hashes, pivoting from POP3 to SSH, and exploiting a writable MOTD script.</p> <a href="https://hackpaper.com/2025/tryhackme-fowsniff-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-fowsniff-writeup"></link>
    <summary>A full writeup for the TryHackMe Fowsniff CTF. Learn how to go from leaked credentials to root access by cracking MD5 hashes, pivoting from POP3 to SSH, and exploiting a writable MOTD script.</summary>
    <category term="CTF"></category>
    <published>2025-09-02T07:57:20.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-anthem-writeup</id>
    <title>TryHackMe - Anthem</title>
    <updated>2025-09-01T17:37:04.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-anthem-writeup/thumbnail.jpg" /> <p>A comprehensive walkthrough of the TryHackMe Anthem room. This guide covers reconnaissance via robots.txt, gaining initial access to the Umbraco CMS, connecting via RDP, and escalating privileges on Windows by manipulating file permissions to reveal the administrator password.</p> <a href="https://hackpaper.com/2025/tryhackme-anthem-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-anthem-writeup"></link>
    <summary>A comprehensive walkthrough of the TryHackMe Anthem room. This guide covers reconnaissance via robots.txt, gaining initial access to the Umbraco CMS, connecting via RDP, and escalating privileges on Windows by manipulating file permissions to reveal the administrator password.</summary>
    <category term="CTF"></category>
    <published>2025-09-01T17:37:04.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-lianyu-writeup</id>
    <title>TryHackMe - Lian Yu</title>
    <updated>2025-09-01T14:54:37.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-lianyu-writeup/thumbnail.jpg" /> <p>A step-by-step walkthrough for the TryHackMe &#39;Lian Yu&#39; room. This guide covers initial access by discovering hidden directories, decoding a Base58 password for FTP access, and using steganography to find SSH credentials. Privilege escalation is achieved by exploiting sudo rights on pkexec.</p> <a href="https://hackpaper.com/2025/tryhackme-lianyu-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-lianyu-writeup"></link>
    <summary>A step-by-step walkthrough for the TryHackMe &amp;#39;Lian Yu&amp;#39; room. This guide covers initial access by discovering hidden directories, decoding a Base58 password for FTP access, and using steganography to find SSH credentials. Privilege escalation is achieved by exploiting sudo rights on pkexec.</summary>
    <category term="CTF"></category>
    <published>2025-09-01T14:54:37.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-mustacchio-writeup</id>
    <title>TryHackMe - Mustacchio</title>
    <updated>2025-08-29T13:33:15.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-mustacchio-writeup/thumbnail.jpg" /> <p>A step-by-step walkthrough for the TryHackMe &#39;Mustacchio&#39; room. This guide covers initial access via XXE injection and privilege escalation to root by exploiting a SUID binary with a PATH hijacking vulnerability.</p> <a href="https://hackpaper.com/2025/tryhackme-mustacchio-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-mustacchio-writeup"></link>
    <summary>A step-by-step walkthrough for the TryHackMe &amp;#39;Mustacchio&amp;#39; room. This guide covers initial access via XXE injection and privilege escalation to root by exploiting a SUID binary with a PATH hijacking vulnerability.</summary>
    <category term="CTF"></category>
    <published>2025-08-29T13:33:15.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-chillhack-writeup</id>
    <title>TryHackMe - Chill Hack</title>
    <updated>2025-08-28T11:03:29.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-chillhack-writeup/thumbnail.jpg" /> <p>A step-by-step walkthrough for the TryHackMe &#39;Chill Hack&#39; room. This guide covers the entire process from initial reconnaissance and exploiting a command injection vulnerability to escalating privileges to root.</p> <a href="https://hackpaper.com/2025/tryhackme-chillhack-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-chillhack-writeup"></link>
    <summary>A step-by-step walkthrough for the TryHackMe &amp;#39;Chill Hack&amp;#39; room. This guide covers the entire process from initial reconnaissance and exploiting a command injection vulnerability to escalating privileges to root.</summary>
    <category term="CTF"></category>
    <published>2025-08-28T11:03:29.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-wgelctf-writeup</id>
    <title>TryHackMe - Wgel CTF</title>
    <updated>2025-08-27T11:42:45.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-wgelctf-writeup/thumbnail.jpg" /> <p>A step-by-step walkthrough for the TryHackMe Wgel CTF room. This guide shows how to gain initial access via an exposed SSH key and escalate privileges to root by exploiting a wget sudo misconfiguration.</p> <a href="https://hackpaper.com/2025/tryhackme-wgelctf-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-wgelctf-writeup"></link>
    <summary>A step-by-step walkthrough for the TryHackMe Wgel CTF room. This guide shows how to gain initial access via an exposed SSH key and escalate privileges to root by exploiting a wget sudo misconfiguration.</summary>
    <category term="CTF"></category>
    <published>2025-08-27T11:42:45.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-bruteit-writeup</id>
    <title>TryHackMe - Brute It</title>
    <updated>2025-08-26T13:49:07.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-bruteit-writeup/thumbnail.jpg" /> <p>In this article, we take a step-by-step look at the solution to TryHackMe&#39;s &quot;Brute It&quot; room. We gain full access using brute force attacks against the web login form with Hydra, and against the SSH key password and root password hash with John the Ripper.</p> <a href="https://hackpaper.com/2025/tryhackme-bruteit-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-bruteit-writeup"></link>
    <summary>In this article, we take a step-by-step look at the solution to TryHackMe&amp;#39;s &amp;quot;Brute It&amp;quot; room. We gain full access using brute force attacks against the web login form with Hydra, and against the SSH key password and root password hash with John the Ripper.</summary>
    <category term="CTF"></category>
    <published>2025-08-26T13:49:07.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-tomghost-writeup</id>
    <title>TryHackMe - Tomghost</title>
    <updated>2025-08-26T07:21:07.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-tomghost-writeup/thumbnail.jpg" /> <p>A step-by-step walkthrough for the TryHackMe Tomghost room. This write-up covers exploiting the Ghostcat vulnerability (CVE-2020-1938), cracking a PGP private key with John the Ripper, and escalating privileges to root via a sudo misconfiguration with zip.</p> <a href="https://hackpaper.com/2025/tryhackme-tomghost-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-tomghost-writeup"></link>
    <summary>A step-by-step walkthrough for the TryHackMe Tomghost room. This write-up covers exploiting the Ghostcat vulnerability (CVE-2020-1938), cracking a PGP private key with John the Ripper, and escalating privileges to root via a sudo misconfiguration with zip.</summary>
    <category term="CTF"></category>
    <published>2025-08-26T07:21:07.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-ignite-writeup</id>
    <title>TryHackMe - Ignite</title>
    <updated>2025-08-25T14:27:41.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-ignite-writeup/thumbnail.jpg" /> <p>In this article, we walk through solving TryHackMe&#39;s Ignite room step by step. We gain initial access to the system using a public exploit for a vulnerable version of Fuel CMS and then obtain root privileges by leveraging a reused password found in a database configuration file.</p> <a href="https://hackpaper.com/2025/tryhackme-ignite-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-ignite-writeup"></link>
    <summary>In this article, we walk through solving TryHackMe&amp;#39;s Ignite room step by step. We gain initial access to the system using a public exploit for a vulnerable version of Fuel CMS and then obtain root privileges by leveraging a reused password found in a database configuration file.</summary>
    <category term="CTF"></category>
    <published>2025-08-25T14:27:41.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-brooklynninenine-writeup</id>
    <title>TryHackMe - Brooklyn Nine Nine</title>
    <updated>2025-08-25T08:28:54.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-brooklynninenine-writeup/thumbnail.jpg" /> <p>A step-by-step solution guide for the TryHackMe Brooklyn Nine-Nine room. In this article, discover how to gain initial access by finding a user clue on an anonymous FTP server to brute-force an SSH password, and how to gain root privileges by exploiting a misconfigured sudo policy.</p> <a href="https://hackpaper.com/2025/tryhackme-brooklynninenine-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-brooklynninenine-writeup"></link>
    <summary>A step-by-step solution guide for the TryHackMe Brooklyn Nine-Nine room. In this article, discover how to gain initial access by finding a user clue on an anonymous FTP server to brute-force an SSH password, and how to gain root privileges by exploiting a misconfigured sudo policy.</summary>
    <category term="CTF"></category>
    <published>2025-08-25T08:28:54.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-startup-writeup</id>
    <title>TryHackMe - Startup</title>
    <updated>2025-08-25T05:33:27.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-startup-writeup/thumbnail.jpg" /> <p>Step-by-step solution guide for the TryHackMe Startup room. In this article, discover how to gain initial access via a writable FTP service using PHP reverse shell, how to obtain user credentials by analysing PCAP with Wireshark, and how to gain root privileges by exploiting a misconfigured cron job.</p> <a href="https://hackpaper.com/2025/tryhackme-startup-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-startup-writeup"></link>
    <summary>Step-by-step solution guide for the TryHackMe Startup room. In this article, discover how to gain initial access via a writable FTP service using PHP reverse shell, how to obtain user credentials by analysing PCAP with Wireshark, and how to gain root privileges by exploiting a misconfigured cron job.</summary>
    <category term="CTF"></category>
    <published>2025-08-25T05:33:27.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-cyborg-writeup</id>
    <title>TryHackMe - Cyborg</title>
    <updated>2025-08-23T05:49:06.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-cyborg-writeup/thumbnail.jpg" /> <p>In this article, we walk through solving TryHackMe&#39;s Cyborg room step by step. We gain initial access to the system using credentials leaked from an encrypted Borg backup and then obtain root privileges through a misconfigured sudo setup.</p> <a href="https://hackpaper.com/2025/tryhackme-cyborg-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-cyborg-writeup"></link>
    <summary>In this article, we walk through solving TryHackMe&amp;#39;s Cyborg room step by step. We gain initial access to the system using credentials leaked from an encrypted Borg backup and then obtain root privileges through a misconfigured sudo setup.</summary>
    <category term="CTF"></category>
    <published>2025-08-23T05:49:06.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-overpass-writeup</id>
    <title>TryHackMe - Overpass</title>
    <updated>2025-08-21T12:23:20.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-overpass-writeup/thumbnail.jpg" /> <p>This write-up details the process of compromising the &quot;Overpass&quot; machine, starting with bypassing a weak login function to steal an SSH key and escalating to root by exploiting a misconfigured scheduled task.</p> <a href="https://hackpaper.com/2025/tryhackme-overpass-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-overpass-writeup"></link>
    <summary>This write-up details the process of compromising the &amp;quot;Overpass&amp;quot; machine, starting with bypassing a weak login function to steal an SSH key and escalating to root by exploiting a misconfigured scheduled task.</summary>
    <category term="CTF"></category>
    <published>2025-08-21T12:23:20.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-lazyadmin-writeup</id>
    <title>TryHackMe - LazyAdmin</title>
    <updated>2025-08-20T08:34:58.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-lazyadmin-writeup/1.jpg" /> <p>This article is a step-by-step walkthrough for the &#39;LazyAdmin&#39; room on TryHackMe. It covers finding a vulnerable CMS to get initial access and then exploiting a misconfigured script for root privileges.</p> <a href="https://hackpaper.com/2025/tryhackme-lazyadmin-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-lazyadmin-writeup"></link>
    <summary>This article is a step-by-step walkthrough for the &amp;#39;LazyAdmin&amp;#39; room on TryHackMe. It covers finding a vulnerable CMS to get initial access and then exploiting a misconfigured script for root privileges.</summary>
    <category term="CTF"></category>
    <published>2025-08-20T08:34:58.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-agentsudo-writeup</id>
    <title>TryHackMe - Agent Sudo</title>
    <updated>2025-08-19T11:07:27.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-AgentSudo-writeup/1.jpg" /> <p>In this write-up, we will solve TryHackMe&#39;s beginner-level &#39;Agent Sudo&#39; room step-by-step. We will learn how to gain root privileges using web enumeration, FTP brute-forcing with Hydra, extracting hidden data with steganography, and exploiting the CVE-2019-14287 sudo vulnerability, all demonstrated with detailed visuals.</p> <a href="https://hackpaper.com/2025/tryhackme-agentsudo-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-agentsudo-writeup"></link>
    <summary>In this write-up, we will solve TryHackMe&amp;#39;s beginner-level &amp;#39;Agent Sudo&amp;#39; room step-by-step. We will learn how to gain root privileges using web enumeration, FTP brute-forcing with Hydra, extracting hidden data with steganography, and exploiting the CVE-2019-14287 sudo vulnerability, all demonstrated with detailed visuals.</summary>
    <category term="CTF"></category>
    <published>2025-08-19T11:07:27.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-bountyhacker-writeup</id>
    <title>TryHackMe - Bounty Hacker</title>
    <updated>2025-08-18T08:05:30.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-BountyHacker-writeup/1.jpg" /> <p>A detailed beginner&#39;s guide to the TryHackMe Bounty Hacker room: discovery with Nmap/Rustscan, anonymous FTP access, SSH brute-force with Hydra, and privilege escalation with SUID (tar).</p> <a href="https://hackpaper.com/2025/tryhackme-bountyhacker-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-bountyhacker-writeup"></link>
    <summary>A detailed beginner&amp;#39;s guide to the TryHackMe Bounty Hacker room: discovery with Nmap/Rustscan, anonymous FTP access, SSH brute-force with Hydra, and privilege escalation with SUID (tar).</summary>
    <category term="CTF"></category>
    <published>2025-08-18T08:05:30.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/tryhackme-rootme-writeup</id>
    <title>TryHackMe - RootMe</title>
    <updated>2025-08-17T15:35:03.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/tryhackme-rootme-writeup/1.jpg" /> <p>In this article, we will provide a step-by-step solution for the easy-level &quot;RootMe&quot; room on the TryHackMe platform, explaining the logic behind each step. Our goal is not just to copy and paste commands, but to understand why and how they work.</p> <a href="https://hackpaper.com/2025/tryhackme-rootme-writeup">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/tryhackme-rootme-writeup"></link>
    <summary>In this article, we will provide a step-by-step solution for the easy-level &amp;quot;RootMe&amp;quot; room on the TryHackMe platform, explaining the logic behind each step. Our goal is not just to copy and paste commands, but to understand why and how they work.</summary>
    <category term="CTF"></category>
    <published>2025-08-17T15:35:03.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/what-is-vlan-and-what-are-port-types</id>
    <title>What is VLAN and What are Port Types?</title>
    <updated>2025-08-08T13:24:23.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/What-is-VLAN-and-What-are-Port-Types/thumbnail.jpg" /> <p>In this article, we will discuss what VLAN is, how to assign a VLAN to a device, and VLAN security and attacks.</p> <a href="https://hackpaper.com/2025/what-is-vlan-and-what-are-port-types">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/what-is-vlan-and-what-are-port-types"></link>
    <summary>In this article, we will discuss what VLAN is, how to assign a VLAN to a device, and VLAN security and attacks.</summary>
    <category term="Network"></category>
    <published>2025-08-08T13:24:23.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/basic-structure-of-ipv4-subnetting</id>
    <title>Basic Structure of IPv4 - Subnetting</title>
    <updated>2025-08-07T18:08:26.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/basic-structure-of-ipv4-subnetting/1.jpg" /> <p>In this article, we will discuss the basic structure of IPv4, Network Masks, Host-Network IDs, Broadcast addresses, CIDR notation, Subnet calculations and more with examples.</p> <a href="https://hackpaper.com/2025/basic-structure-of-ipv4-subnetting">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/basic-structure-of-ipv4-subnetting"></link>
    <summary>In this article, we will discuss the basic structure of IPv4, Network Masks, Host-Network IDs, Broadcast addresses, CIDR notation, Subnet calculations and more with examples.</summary>
    <category term="Network"></category>
    <published>2025-08-07T18:08:26.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/what-is-a-proxy</id>
    <title>What is a Proxy?</title>
    <updated>2025-08-07T08:58:18.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/what-is-a-proxy/1.jpg" /> <p>In this article, we will talk about what a proxy is, what it does and what is its role in cyber security, and we will talk about examples with Burpsuite.</p> <a href="https://hackpaper.com/2025/what-is-a-proxy">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/what-is-a-proxy"></link>
    <summary>In this article, we will talk about what a proxy is, what it does and what is its role in cyber security, and we will talk about examples with Burpsuite.</summary>
    <category term="Network"></category>
    <published>2025-08-07T08:58:18.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/2-dev-null-command-what-is-and-what-is-useful</id>
    <title>What is the 2&gt;/dev/null Command and What Does It Do?</title>
    <updated>2025-05-03T12:55:53.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/2-dev-null-command-what-is-and-what-is-useful/1.jpg" /> <p>You might have seen this command in many places, and it might seem complex at first. But don&#39;t worry, in this content, we&#39;ll cover the basics and clarify the questions in our minds.</p> <a href="https://hackpaper.com/2025/2-dev-null-command-what-is-and-what-is-useful">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/2-dev-null-command-what-is-and-what-is-useful"></link>
    <summary>You might have seen this command in many places, and it might seem complex at first. But don&amp;#39;t worry, in this content, we&amp;#39;ll cover the basics and clarify the questions in our minds.</summary>
    <category term="Linux"></category>
    <published>2025-05-03T12:55:53.000Z</published>
  </entry>
  <entry>
    <id>https://hackpaper.com/2025/file-permissions-and-management-in-linux</id>
    <title>File Permissions and Permission Management in Linux</title>
    <updated>2025-05-03T08:11:08.000Z</updated>
    <author>
      <name>Ali Sünbül</name>
    </author>
    <content type="html">
      <![CDATA[<img src="https://hackpaper-image-server.netlify.app/images/blogs/file-permissions-and-management-in-linux/1.jpg" /> <p>In Linux operating systems, permissions are a fundamental security mechanism that determines who can access files and directories and how that access is handled.</p> <a href="https://hackpaper.com/2025/file-permissions-and-management-in-linux">Click to read full article</a>]]>
    </content>
    <link href="https://hackpaper.com/2025/file-permissions-and-management-in-linux"></link>
    <summary>In Linux operating systems, permissions are a fundamental security mechanism that determines who can access files and directories and how that access is handled.</summary>
    <category term="Linux"></category>
    <published>2025-05-03T08:11:08.000Z</published>
  </entry>
</feed>
