Dashboard » Noticias
José Moreno
Elzer Pineda
Elzer Pineda
Elzer Pineda
José Moreno
José Moreno
Noticias sobre ciberseguridad
CI/CD Pipeline de Wordpress en Azure
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T031342Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=c4362184893bda8d31bff2dd1286f35fa8ae5445c93605fafd7dc8abfe41358c)
Wordpress es uno de los CMS más utilizado a nivel mundial cuenta ..
Como crear un CTF con Owasp Juice Shop y Traefik
![](https://djo7sloxtuec0.cloudfront.net/assets/avatar-50-0786e8de7062852709e518d8a1d88272d584f121d70a493ea2a4857c60914f31.png)
Durante toda mi aventura con Owasp Juice Shop he realizado evento..
Simple reverse ICMP Shell
![](https://djo7sloxtuec0.cloudfront.net/assets/avatar-50-0786e8de7062852709e518d8a1d88272d584f121d70a493ea2a4857c60914f31.png)
Planteando el escenario para ejecutar nuestra revershell, tenemos..
Writeup-Servmon Hack the box
![](https://djo7sloxtuec0.cloudfront.net/assets/avatar-50-0786e8de7062852709e518d8a1d88272d584f121d70a493ea2a4857c60914f31.png)
Pasos para resolver Servmon Hack The Box.Nmap Scan Enumerate FTP..
Multi-Site con Lets Encrypt
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T031343Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=032dc4e26426487cfa377610c48edc80bb5f149b29f8524411343eb49ebf9add)
El uso de contenedores ha facilitado la implementación de diversa..
Escaner de Vulnerabilidades Vuls
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T031343Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=032dc4e26426487cfa377610c48edc80bb5f149b29f8524411343eb49ebf9add)
Al igual que en otras situaciones, luego de una conferencia de la..