Dashboard » Noticias
Omar Jacobo Muñoz Veliz
Sheyla Leacock
Omar Jacobo Muñoz Veliz
Omar Jacobo Muñoz Veliz
Omar Jacobo Muñoz Veliz
Omar Jacobo Muñoz Veliz
Noticias sobre ciberseguridad
Trape 2.0 – Herramienta OSINT para rastrear personas
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T083550Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=cd4ddf948430eccd8bffeb60e9286f9a44470238ad18b10fbd6d5f13ceeb315d)
Trape es una herramienta de análisis e investigación OSINT, que p..
Analizando la seguridad de la red con Snorby
![](https://bta-plataform-prod.s3.amazonaws.com/variants/Dw6BM7gB8Q28j3527ZQ349ic/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2220210721_132408%25282%2529.jpg%22%3B%20filename%2A%3DUTF-8%27%2720210721_132408%25282%2529.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T083550Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b25df9e556a5379573e2a5b41c630bbe377b275279745aab33d1b43590d478be)
Una de las técnicas existentes para proteger los sistemas es la m..
Evadiendo antivirus con meterpreter y Green Hat Suite
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T083551Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=26cec3e42e57a915aad246a5611aa17494567816d6839ae81fa623b24342c1b3)
Es muy común que en la ejecución de pruebas de penetración e ing..
Eludiendo la política de ejecución de PowerShell
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T083551Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=26cec3e42e57a915aad246a5611aa17494567816d6839ae81fa623b24342c1b3)
De manera predeterminada, PowerShell está configurado para evitar..
Generar un email Spamming
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T083551Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=26cec3e42e57a915aad246a5611aa17494567816d6839ae81fa623b24342c1b3)
El día de hoy encontramos un script muy interesante sobre un gene..
Análisis de vulnerabilidades con Vscan
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T083551Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=26cec3e42e57a915aad246a5611aa17494567816d6839ae81fa623b24342c1b3)
Esta herramienta de análisis de vulnerabilidades usa usando nmap ..