Dashboard » Noticias
José Moreno
Moises Garciaguirre
Omar Jacobo Muñoz Veliz
Paola Mc Guire Cancino
Omar Jacobo Muñoz Veliz
Omar Jacobo Muñoz Veliz
Noticias sobre ciberseguridad
Telegram Bot como Framework de Pentesting
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T025601Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=94fa790dc1af76550ec75862099c91d77df9a84cc5f4a472322fc5453bba71b3)
Hace unos meses con un par de mis amigos de la comunidad dojo (Hu..
Synapsint, una herramienta de Footprinting automatizada
![](https://djo7sloxtuec0.cloudfront.net/assets/avatar-50-0786e8de7062852709e518d8a1d88272d584f121d70a493ea2a4857c60914f31.png)
Synapsint.com es una herramienta que nace con el fin de poder rec..
Qué es el Owasp A1 - Inyección
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T025601Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5f61e99b5e1fcf6159bcbea30b27e85d44daff26b282c28bc49acd367fdf3561)
La inyección de código es la explotación de un error de la comput..
Cómo ciberdelincuentes se aprovechan del miedo a que la OMS ha declarado al coro...
![](https://bta-plataform-prod.s3.amazonaws.com/variants/AtBLmGYF5YqjhcExSQPzmtRL/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22IMG_4294-3.jpg%22%3B%20filename%2A%3DUTF-8%27%27IMG_4294-3.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T025601Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=2aff3239ae0a5f2d2087a2a8d83b2be9e7cf7c7461d89d9a010a7ae0c5234703)
Los cibercriminales continúan explotando el miedo en el brote de ..
#hc0n2020 : Crónica de la tercera conferencia de @Hackplayers
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T025601Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5f61e99b5e1fcf6159bcbea30b27e85d44daff26b282c28bc49acd367fdf3561)
H-c0n es una de las conferencias mas grandes en españa que reune ..
Qué es el ataque CRLF
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T025602Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=1e507fe4e5b1e3fd89dfc8be74d471b19f60286460d82f379aface0e5946b206)
El término CRLF se refiere al retorno de carro (ASCII 13, \r) de ..