Dashboard » Noticias
José Moreno
Elzer Pineda
Elzer Pineda
Elzer Pineda
José Moreno
José Moreno
Noticias sobre ciberseguridad
CI/CD Pipeline de Wordpress en Azure
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T130934Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=89cb8823680b5d5c68921341a05f133448416602b49ea298d06b1ad2cac72268)
Wordpress es uno de los CMS más utilizado a nivel mundial cuenta ..
Como crear un CTF con Owasp Juice Shop y Traefik
![](https://djo7sloxtuec0.cloudfront.net/assets/avatar-50-0786e8de7062852709e518d8a1d88272d584f121d70a493ea2a4857c60914f31.png)
Durante toda mi aventura con Owasp Juice Shop he realizado evento..
Simple reverse ICMP Shell
![](https://djo7sloxtuec0.cloudfront.net/assets/avatar-50-0786e8de7062852709e518d8a1d88272d584f121d70a493ea2a4857c60914f31.png)
Planteando el escenario para ejecutar nuestra revershell, tenemos..
Writeup-Servmon Hack the box
![](https://djo7sloxtuec0.cloudfront.net/assets/avatar-50-0786e8de7062852709e518d8a1d88272d584f121d70a493ea2a4857c60914f31.png)
Pasos para resolver Servmon Hack The Box.Nmap Scan Enumerate FTP..
Multi-Site con Lets Encrypt
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T130935Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=29978791377585e2560335715ddfec3db6a3b02661b477309f8adcac5df83933)
El uso de contenedores ha facilitado la implementación de diversa..
Escaner de Vulnerabilidades Vuls
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T130935Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=29978791377585e2560335715ddfec3db6a3b02661b477309f8adcac5df83933)
Al igual que en otras situaciones, luego de una conferencia de la..