Se alerta sobre una estafa en Madrid a través de la colocación de boletines de denuncia falsos. https://unaaldia.hispasec.com/2022/12/se-alerta-sobre-una-estafa-en-madrid-a-traves-de-la-colocacion-de-boletines-de-denuncia-falsos.html?utm_source=rss&utm_medium=rss&utm_campaign=se-alerta-sobre-una-estafa-en-madrid-a-traves-de-la-colocacion-de-boletines-de-denuncia-falsos
Una al Día
Se alerta sobre una estafa en Madrid a través de la colocación de boletines de denuncia falsos.
El Ayuntamiento de Madrid a través de su cuenta de Twitter y su blog oficial han alertado sobre una práctica que se ha estado llevando en el barrio de Carabanchel en la cuál algunos coches, que no se encontraban correctamente estacionados, aparecían con un…
R4Ven, una herramienta para rastrear la ubicación IP y GPS https://derechodelared.com/r4ven-ubicacion-ip-gps/
Derecho de la Red
R4Ven, una herramienta para rastrear la ubicación IP y GPS
R4Ven es una herramienta que nos permite poder capturar la ubicación, IP e información del dispositivo de una persona.
4 Core Benefits of Cloud Backup for SaaS Platforms https://terrycutler.com/4-core-benefits-of-cloud-backup-for-saas-platforms/
Terry Cutler - The Ethical Hacker
4 Core Benefits of Cloud Backup for SaaS Platforms
Businesses like yours are increasingly adopting cloud-based solutions to keep up with the rapidly changing technological landscape. Many of these organizations, however, are unaware of the critical importance of having a backup for their cloud-based data.…
Descubierto malware utilizando GitHub para resolver su servidor de Command & Control https://unaaldia.hispasec.com/2022/12/descubierto-malware-utilizando-github-para-resolver-su-servidor-de-command-control.html?utm_source=rss&utm_medium=rss&utm_campaign=descubierto-malware-utilizando-github-para-resolver-su-servidor-de-command-control
Una al Día
Descubierto malware utilizando GitHub para resolver su servidor de Command & Control
Descubierto malware personalizado del que no había información hasta ahora, denominado Drokbk, el cual utiliza GitHub para resolver su C2.
Advent of Cyber 2022 [Day 11]-Memory Forensics-Not all gifts are nice Write up https://infosecwriteups.com/advent-of-cyber-2022-day-11-memory-forensics-not-all-gifts-are-nice-write-up-1ec97f6d8249?source=rss----7b722bfd1b8d---4
Medium
Advent of Cyber 2022 [Day 11]-Memory Forensics-Not all gifts are nice Write up
Advent of Cyber 2022 [Day 11] Memory Forensics Not all gifts are nice | Task 16 Answers Write-up and Walkthrough By Karthikeyan Nagaraj
Lian_Yu — TryHackMe Writeup by Karthikeyan https://infosecwriteups.com/lian-yu-ae415d1f6fc7?source=rss----7b722bfd1b8d---4
Medium
Lian_Yu — TryHackMe Writeup by Karthikeyan
A beginner level security challenge
Advent of Cyber 2022 [Day 7]-Cyber Chef Maldocs roasting on an open fire Writeup by Karthikeyan… https://infosecwriteups.com/advent-of-cyber-2022-day-7-cyber-chef-maldocs-roasting-on-an-open-fire-writeup-by-karthikeyan-edd2f2f8a4b5?source=rss----7b722bfd1b8d---4
Medium
Advent of Cyber 2022 [Day 7]-Cyber Chef Maldocs roasting on an open fire Writeup by Karthikeyan Nagaraj
Advent of Cyber 4 2022 [Day 7] Cyber Chef Maldocs roasting on an open fire — task 12 Answers
Advent of Cyber 2022 [Day5] Email Analysis — It’s beginning to look a lot like phishing by… https://infosecwriteups.com/advent-of-cyber-2022-day5-email-analysis-its-beginning-to-look-a-lot-like-phishing-by-978dab792ebf?source=rss----7b722bfd1b8d---4
Medium
Advent of Cyber 2022 [Day6] Email Analysis — It’s beginning to look a lot like phishing by Karthikeyan Nagaraj
Advent of Cyber 2022 Day 6 — It’s beginning to look a lot like phishing Walkthrough Answers
Advent of Cyber Day 2~ Log Analysis Santa’s Naughty & Nice Log https://infosecwriteups.com/advent-of-cyber-day-2-log-analysis-santas-naughty-nice-log-ff194383a9e3?source=rss----7b722bfd1b8d---4
Medium
TryHackMe Advent of Cyber 2022 [Day 2] | Karthikeyan Nagaraj
Advent of Cyber-4 Day 2 — December 2, 2022 ~ Karthikeyan Nagaraj
Carnage — TryHackme Write-up (600 Points) | Cyberw1ng https://infosecwriteups.com/carnage-tryhackme-write-up-600-points-cyberw1ng-6e4468c010a8?source=rss----7b722bfd1b8d---4
Medium
Carnage — TryHackme Write-up (600 Points) | Cyberw1ng
Apply your analytical skills to analyze the malicious network traffic using Wireshark.
Write-up: SQL injection with filter bypass via XML encoding @ PortSwigger Academy https://infosecwriteups.com/write-up-sql-injection-with-filter-bypass-via-xml-encoding-portswigger-academy-977aaeb2b04d?source=rss----7b722bfd1b8d---4
Medium
Write-up: SQL injection with filter bypass via XML encoding @ PortSwigger Academy
This write-up for the lab SQL injection with filter bypass via XML encoding is part of my walk-through series for PortSwigger’s Web…
Portswigger Lab: JWT authentication bypass via algorithm confusion with no exposed key, a slightly… https://infosecwriteups.com/portswigger-lab-jwt-authentication-bypass-via-algorithm-confusion-with-no-exposed-key-a-slightly-e28602b6ef70?source=rss----7b722bfd1b8d---4
Medium
Portswigger Lab: JWT authentication bypass via algorithm confusion with no exposed key, a slightly…
, or how I learned the importance of RTFM yet again
Global security assessment: Knowing the weaknesses to address them https://www.tarlogic.com/blog/global-security-assessment-knowing-the-weaknesses/
Tarlogic Security
Global security assessment: Knowing the weaknesses to address them
Conducting a global security assessment allows mapping all the weaknesses and vulnerabilities of an organization
Cómo integrar Burp y ZAP para Hacking y pentesting web https://thehackerway.com/2022/12/14/como-integrar-burp-y-zap-para-hacking-web/
Seguridad en Sistemas y Técnicas de Hacking. TheHackerWay (THW)
Cómo integrar Burp y ZAP para Hacking y pentesting web
Demostración en vídeo de este post: En el curso de Hacking contra APIS Rest disponible en THW, enseño muchas técnicas y utilidades para hacer auditorías sobre este tipo de aplicaciones, desde exten…