Dashboard » Noticias
Omar Jacobo Muñoz Veliz
Omar Jacobo Muñoz Veliz
Misael Banales
Sebastian Veliz
Felipe Barrios
Felipe Barrios
Noticias sobre ciberseguridad
Prueba de seguridad en API Rest
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T140154Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=7dd9882b7b52e483a48b99812d159407b811901c038051cef731f2b7b26367d7)
Las pruebas de penetración de la API REST son complejas debido a ..
Robar los hashes NTLM con Bad-PDF
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T140155Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=dc6e8d7ae99d284eeec0f24e821cd2ead7fbd931bf7759669c2bd30198d9c57d)
Bad-PDF crea archivos PDF maliciosos para robar Hashes NTLM (NTLM..
RAT(Remote Access Trojan) en python con basicRAT
Se trata de un Python 2.7. x Remote Access Trojan (RAT) multiplat..
SQL Injection God Level ¿Mito o Realidad?
![](https://bta-plataform-prod.s3.amazonaws.com/variants/n7G5uKD3gBsKR9thPpJPvgt2/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2228428972_394770877650233_1145374104606474240_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2728428972_394770877650233_1145374104606474240_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T140155Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=13c343865cd6605f76373aff3fc0b73db2aae7a688b4a7992dc20862009d49fb)
El siguiente articulo tiene por objetivo poner a prueba un mito q..
Google Hacking para Pentester
![](https://bta-plataform-prod.s3.amazonaws.com/variants/h4EqpPMeHmyACJEVyxMG6x23/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2212063705_10207273024561428_59106377850244238_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2712063705_10207273024561428_59106377850244238_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T140155Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=6df73a8bbcfdda46e710294ab2a25e3ff1967aafb3576d5979826f0e3a65d5f1)
Google Hacking es el significado del uso original del motor de bú..
Manipulación de paquetes Tipo ACK GET con Scapy y Python
![](https://bta-plataform-prod.s3.amazonaws.com/variants/h4EqpPMeHmyACJEVyxMG6x23/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2212063705_10207273024561428_59106377850244238_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2712063705_10207273024561428_59106377850244238_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T140155Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=6df73a8bbcfdda46e710294ab2a25e3ff1967aafb3576d5979826f0e3a65d5f1)
Este trabajo tiene por objetivo comprender el funcionamiento de l..