Dashboard » Cristian Jose Acuña Ramirez » Mis artículos
Cristian Jose Acuña Ramirez
@user-1543237612
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T033514Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=f4106e185d39da4aab64c779a7101172cc47c5c1f49c252ab6cf449c0971a3b6)
Cristian Jose Acuña Ramirez
@user-1543237612
Cybersecurity Specialyst Teacher
Escribe artículos para la comunidad
Inteligencia de Amenazas Cibernéticas con IBM X-FORCE EXCHANGE
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T033515Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5123b1cd3b66478ad5e391f95c968d1f0e3328402ec1defafa85e154cb98d71b)
La inteligencia de amenazas ciberneticas tiene muchas aristas, y ..
Enumeración de usuarios SMB de windows desde Linux
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T033515Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5123b1cd3b66478ad5e391f95c968d1f0e3328402ec1defafa85e154cb98d71b)
Este articulo pretende desarrollar el uso de Enum4linux para real..
Shell reverse php en Linux con Burpsuite.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T033515Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5123b1cd3b66478ad5e391f95c968d1f0e3328402ec1defafa85e154cb98d71b)
Un atacante puede hacer uso de formularios no sanitizados para ha..
Azorult - Malware que atenta contra las billeteras de Criptomonedas.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T033515Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5123b1cd3b66478ad5e391f95c968d1f0e3328402ec1defafa85e154cb98d71b)
Es un malware de tipo troyano que comenzó a detectarse en el añ..
Detección de Intrusos en la Red con SNORT
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T033515Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5123b1cd3b66478ad5e391f95c968d1f0e3328402ec1defafa85e154cb98d71b)
En la actualidad es importante tener nuestras redes protegidas, e..
OSMEDEUS - Reconocimiento automático y escaneo en pruebas de Penetración.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T033515Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5123b1cd3b66478ad5e391f95c968d1f0e3328402ec1defafa85e154cb98d71b)
Las pruebas de penetración y escaneo de vulnerabilidades deben re..