Dashboard » Cristian Jose Acuña Ramirez » Mis artículos
Cristian Jose Acuña Ramirez
@user-1543237612
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
Cristian Jose Acuña Ramirez
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T085627Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=45b9af2f10cd8240947ad5d781976bf3a5d9bfea26eb990516f95fbde052edd9)
Cristian Jose Acuña Ramirez
@user-1543237612
Cybersecurity Specialyst Teacher
Escribe artículos para la comunidad
Inteligencia de Amenazas Cibernéticas con IBM X-FORCE EXCHANGE
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T085627Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=bac61cc74f153fecc68cb8629a1d830e0d3275aa293139417a753a0256b3eb89)
La inteligencia de amenazas ciberneticas tiene muchas aristas, y ..
Enumeración de usuarios SMB de windows desde Linux
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T085628Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b4a4095adbc2d56d67e6a11f7dd630c9907e7065589accc0c916fe367526c7cd)
Este articulo pretende desarrollar el uso de Enum4linux para real..
Shell reverse php en Linux con Burpsuite.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T085628Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b4a4095adbc2d56d67e6a11f7dd630c9907e7065589accc0c916fe367526c7cd)
Un atacante puede hacer uso de formularios no sanitizados para ha..
Azorult - Malware que atenta contra las billeteras de Criptomonedas.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T085628Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b4a4095adbc2d56d67e6a11f7dd630c9907e7065589accc0c916fe367526c7cd)
Es un malware de tipo troyano que comenzó a detectarse en el añ..
Detección de Intrusos en la Red con SNORT
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T085628Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b4a4095adbc2d56d67e6a11f7dd630c9907e7065589accc0c916fe367526c7cd)
En la actualidad es importante tener nuestras redes protegidas, e..
OSMEDEUS - Reconocimiento automático y escaneo en pruebas de Penetración.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/NywcRZDwbUTygYqcJDrwrUVu/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%226e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg%22%3B%20filename%2A%3DUTF-8%27%276e76f75b-b5b8-49f8-8b6a-73d757ad7c65.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T085628Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b4a4095adbc2d56d67e6a11f7dd630c9907e7065589accc0c916fe367526c7cd)
Las pruebas de penetración y escaneo de vulnerabilidades deben re..