Dashboard » Noticias
Cannibal .
José Alejandro Gago
Cristian Palma P
Omar Jacobo Muñoz Veliz
Romario Miranda Paternina
Felipe Barrios
Noticias sobre ciberseguridad
Inyectando código en archivos PE (2)
![](https://bta-plataform-prod.s3.amazonaws.com/variants/K15Tmu7nZhf3h2Yh5uTQwzuP/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22GatoRison.jpg%22%3B%20filename%2A%3DUTF-8%27%27GatoRison.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T042723Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=71578324495c4790460d431062bee7cabe641a0be9fa45f6ffdec8f497e5ec1a)
En la primera parte de esta serie de artículos sobre “inyección d..
Comprometiendo Windows 7 x64 con EternalBlue, DoublePulsar y Empire
![](https://bta-plataform-prod.s3.amazonaws.com/variants/yeMxHqx1BXccLryQZsvQxHDK/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22z43Vi97d_400x400.png%22%3B%20filename%2A%3DUTF-8%27%27z43Vi97d_400x400.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T042723Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b976e0ea33bbeda9a8abd75b1322a8f281d878fa342a9feb5f9920c39ecee71a)
EternalBlue es un exploit supuestamente desarrollado por la NSA. ..
Instalando Metasploit WUI en Windows
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T042723Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=04b127faaebdb6b3afc8c344bd3785c33fb41b3d8a62005cc864cc4b4250e96e)
Metasploit es una de la más popular y conocida herramienta de Pen..
Automatización de seguridad en API's con Astra
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T042724Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=be09f3a57740720f52a36320a7d548d7cb4eb437868b7b2d910918cfbe4ccb10)
Las pruebas de penetración API REST son complejas debido a los co..
Google Hacking
![](https://bta-plataform-prod.s3.amazonaws.com/variants/LQSSkeNCpTDKysPVNqDFEoZy/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22IMG_20190910_145049285-01.jpeg%22%3B%20filename%2A%3DUTF-8%27%27IMG_20190910_145049285-01.jpeg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T042724Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=1e1b1361b95a2b3abd93054556b783c0430c39e6f668a6437b5647deb06347e4)
Google es uno de los buscadores más usados en el mundo, pero ¿sa..
Implementación y pruebas automatizadas con Github Actions CI/CD
![](https://bta-plataform-prod.s3.amazonaws.com/variants/h4EqpPMeHmyACJEVyxMG6x23/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2212063705_10207273024561428_59106377850244238_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2712063705_10207273024561428_59106377850244238_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T042724Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=e14481e18e6d694a809b2078dcb9bd7ac14ed7bdf6921df30f71f58887b8120e)
¿Qué es CI/CD? Según Wikipedia, en ingeniería de software, CI/..