Dashboard » Noticias
José Moreno
José Moreno
José Moreno
Estevenson Luis Solano
Elzer Pineda
Noticias sobre ciberseguridad
Herramientas Serverless para Pentesting
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T024947Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=fe9bb806f6c34324499eff3fe217aef71c9def9d7f832315b21eb6c3a0670216)
En múltiples ocasiones nos ha tocado realizar pensteting pero no ..
Análisis de Vulnerabilidades con Flan Scan
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T024948Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=a49571aa7b30978df347b26a6fe4d912417ec01e081069b08079ac19b3e2f52c)
Es una herramienta de escaneo de vulnerabilidades creado por clou..
OSINT Docker Registry
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T024948Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=a49571aa7b30978df347b26a6fe4d912417ec01e081069b08079ac19b3e2f52c)
Recientemente he tenido algo de tiempo para dedicarme a escribir ..
Los cibercriminales comprometen cada vez más el ciberespacio
![](https://bta-plataform-prod.s3.amazonaws.com/variants/Lxz1UcrnNkKTKcPsXTYJrdS4/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22download12.png%22%3B%20filename%2A%3DUTF-8%27%27download12.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T024948Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=aca8866b28fb417cbe3fc455780b3ae08eb46776a400557d49b1c2a6a0d23b90)
Ante la pandemia global de COVID 19 la ciberseguridad ha sido un ..
Instalación y configuración para ambiente de laboratorio de Pentest controlado p...
![](https://djo7sloxtuec0.cloudfront.net/assets/avatar-50-0786e8de7062852709e518d8a1d88272d584f121d70a493ea2a4857c60914f31.png)
En la actualidad para desarrollar un laboratorio de pentesting de..