Dashboard » Noticias
Felipe Barrios
Omar Jacobo Muñoz Veliz
Andres Galeano
Rafael Peru Crackers
Rafael Peru Crackers
Omar Jacobo Muñoz Veliz
Noticias sobre ciberseguridad
Comenzando con elasticsearch para proyectos Big data.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/h4EqpPMeHmyACJEVyxMG6x23/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2212063705_10207273024561428_59106377850244238_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2712063705_10207273024561428_59106377850244238_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074356Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=3df7728faf14b6cda47c8c15f861ceee77d96b308a0f1eb02161501a3e8e2e37)
Hay algunos conceptos que son fundamentales para Elasticsearch. C..
Instalando Parrot Security Os
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074356Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=e22fb2c64f9f21772aebafec9c552cd5791ed13da3aa3e7d9851696665bb440c)
Parrot security os se ha vuelto en uno de los sistemas más popula..
Explotando Windows 2012 R2 con EternalBlue
![](https://bta-plataform-prod.s3.amazonaws.com/variants/KFDx9kgK6xwdzPKKg5yBduZg/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22foto.jpg%22%3B%20filename%2A%3DUTF-8%27%27foto.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074357Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=6ff6aa3f15bbce8210299d405069534d80712dcad3fdca427a7c7d5178a231ca)
En el post anterior (Usando el exploit EternalBlue de la NSA) pud..
Introducción a la Ingeniería Inversa Capitulo IV
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074357Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=8de70eb0cab456dc1960146fb9dbe03a17124fcd2d231227b467750187483f1d)
Este método es la más usada debido a que utiliza los datos de nue..
Introducción a la Ingeniería Inversa Capitulo III
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074357Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=8de70eb0cab456dc1960146fb9dbe03a17124fcd2d231227b467750187483f1d)
En este punto veremos este metodo de protección llamado CD-CHECK,..
Comprendiendo la Vulnerabilidad CSRF
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074357Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=c01845e3cf0452eb48de15b1706014a1e8ab41010d3d97ce6de84c14a8a9e345)
En las veces que he utilizado alguna herramienta automatizada par..