Dashboard » Andres Galeano » Mis artículos
Andres Galeano
@Funpunch
Andres Galeano
Andres Galeano
Andres Galeano
![](https://bta-plataform-prod.s3.amazonaws.com/variants/KFDx9kgK6xwdzPKKg5yBduZg/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%22foto.jpg%22%3B%20filename%2A%3DUTF-8%27%27foto.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T112657Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=2af671a0153c3e54e41d107d4298a40721a8a14fb430b3327c6b16d76bbcdbb9)
Andres Galeano
@Funpunch
Consultor de seguridad informática Blogger
Escribe artículos para la comunidad
Explotando Windows 2016 con EternalRomance/Synergy (NSA)
![](https://bta-plataform-prod.s3.amazonaws.com/variants/KFDx9kgK6xwdzPKKg5yBduZg/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22foto.jpg%22%3B%20filename%2A%3DUTF-8%27%27foto.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T112657Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=497013310ca1998c5e4d80d84c1038dca03e7fc0aebeca38d6cc5e7c54071b15)
Como hemos comentado en post anteriores (Usando el exploit eterna..
Explotando Windows 2012 R2 con EternalBlue
![](https://bta-plataform-prod.s3.amazonaws.com/variants/KFDx9kgK6xwdzPKKg5yBduZg/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22foto.jpg%22%3B%20filename%2A%3DUTF-8%27%27foto.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T112657Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=497013310ca1998c5e4d80d84c1038dca03e7fc0aebeca38d6cc5e7c54071b15)
En el post anterior (Usando el exploit EternalBlue de la NSA) pud..
Usando el exploit eternalblue de la NSA
![](https://bta-plataform-prod.s3.amazonaws.com/variants/KFDx9kgK6xwdzPKKg5yBduZg/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22foto.jpg%22%3B%20filename%2A%3DUTF-8%27%27foto.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T112657Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=497013310ca1998c5e4d80d84c1038dca03e7fc0aebeca38d6cc5e7c54071b15)
El 8 de abril el grupo The Shadow Brokers luego de haber ingresad..