Dashboard » Noticias
Samuel Esteban
Samuel Esteban
José Alejandro Gago
Samuel Esteban
Samuel Esteban
Omar Jacobo Muñoz Veliz
Noticias sobre ciberseguridad
Inyección SQL: Postgresql
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T055056Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=1c77a7186361203eab64fe8ba79aa7ae8a5829c8f72b979b6e91108d43ab3a0b)
Continuando con las inyecciones SQL de manera manual, el día de h..
Inyección SQL con Mysql en profundidad.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T055056Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=1c77a7186361203eab64fe8ba79aa7ae8a5829c8f72b979b6e91108d43ab3a0b)
Siguiendo con las inyecciones SQL, en esta oportunidad veremos en..
Hackeando la memoria de Windows en tiempo real (POC).
![](https://bta-plataform-prod.s3.amazonaws.com/variants/yeMxHqx1BXccLryQZsvQxHDK/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22z43Vi97d_400x400.png%22%3B%20filename%2A%3DUTF-8%27%27z43Vi97d_400x400.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T055056Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=dac953a3fe971ff2ce716657393ae16d9570dd6b97346e7e9bcf934c547059e8)
OllyDbg es un depurador desarrollado en ensamblador para sistemas..
Inyección SQL: Definición y ejemplos reales.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T055056Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=1c77a7186361203eab64fe8ba79aa7ae8a5829c8f72b979b6e91108d43ab3a0b)
En esta oportunidad hablaremos en detalle sobre las inyecciones S..
Wireshark: Capturando el Tráfico y obteniendo información sensible
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T055056Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=1c77a7186361203eab64fe8ba79aa7ae8a5829c8f72b979b6e91108d43ab3a0b)
Para finalizar con el top 10 de herramientas de Kali Linux, en es..
Usando la técnica de la estenografía para ocultar mensajes en archivos
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T055057Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=aecb64e4b9b0c2132c0c2a87392c65d054a40424b8ef0d03dcdd8f4c96337f9d)
La estenografía es una técnica que se usa para guardar mensajes d..