Dashboard » Noticias
Rafael Peru Crackers
Cristian Palma P
Cristian Palma P
Cristian Palma P
Rafael Peru Crackers
Cristian Palma P
Noticias sobre ciberseguridad
D3SAF10 ESET - Obtén la bandeja y tu pase para ekoparty
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T082032Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=d5524421f0518c716849455399a9ee40ed88b85ca533770d098d602674820e6a)
El 28 de Agosto de 2017, a las 15:06, Omar de BacktrackAcademy me..
Explorando la vulnerabilidad XXE - XML External Entity
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T082033Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=ad2271f7fd44e311af70332eca1b906c916a52d63451e12b562ae5103a00ad29)
Una vulnerabilidad de XXE consiste en una inyección que se aprove..
Explotando Vulnerabilidades con Metasploit Web en Windows
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T082033Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=ad2271f7fd44e311af70332eca1b906c916a52d63451e12b562ae5103a00ad29)
Dentro de las características avanzadas que nos ofrece la interfa..
Instalando Metasploit en Windows
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T082033Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=ad2271f7fd44e311af70332eca1b906c916a52d63451e12b562ae5103a00ad29)
Metasploit es una de la más popular y conocida herramienta de Pen..
Ingeniería inversa a Hex WorkShop Hex Editor
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T082033Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=a4e83d6ce5cd9b0328e4e1777a6253c3b1d2711dca97aad5cf8fed0132ba0072)
Hex WorkShop Hex Editor, es una herramienta de desarrollo hexadec..
Explotando la vulnerabilidad LDF (Local File Disclosure)
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T082033Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=ad2271f7fd44e311af70332eca1b906c916a52d63451e12b562ae5103a00ad29)
Con anterioridad en BacktrackAcademy nos enfocamos generar una id..