Dashboard » Noticias
Omar Jacobo Muñoz Veliz
Omar Jacobo Muñoz Veliz
Omar Jacobo Muñoz Veliz
Omar Jacobo Muñoz Veliz
Omar Jacobo Muñoz Veliz
Omar Jacobo Muñoz Veliz
Noticias sobre ciberseguridad
11 hábitos de ciberseguridad
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T082054Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=06e771c8a0c9d04ad390ee374716a9f898089aad41aa5f9cabb7d08f246b4bea)
Comenzando un nuevo año, ESET Latinoamérica compartió una guía co..
Enumeración de Emails y subdominios de OSINT con theHarvester 3.0
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T082054Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=06e771c8a0c9d04ad390ee374716a9f898089aad41aa5f9cabb7d08f246b4bea)
theHarvester es una herramienta para recopilar nombres de subdomi..
Metasploit 5.0 - El marco de pruebas de penetración más utilizado del mundo
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T082055Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=8e48c94ed97a81fad2a97d58f2f84f6d000635fe56bb62a24233dfb1897a4612)
El conocimiento es poder, especialmente cuando se comparte. Una c..
Manipulando dispositivos Chromecast en la red con Killcast
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T082055Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=8e48c94ed97a81fad2a97d58f2f84f6d000635fe56bb62a24233dfb1897a4612)
Esta herramienta es una Prueba de concepto y es solo para fines d..
Shodanploit - Comando de consola para shodan en Python
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T082055Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=8e48c94ed97a81fad2a97d58f2f84f6d000635fe56bb62a24233dfb1897a4612)
Shodan es un motor de búsqueda en Internet donde se puede encontr..
Ofuscando IPS para saltar filtros firewalls y antivirus
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T082055Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=8e48c94ed97a81fad2a97d58f2f84f6d000635fe56bb62a24233dfb1897a4612)
Se usará la siguiente herramienta Cuteit que es una herramienta d..