Buffer Overflow

Buffer Overflow

In this post we will talk about how one of the oldest computer attacks occurs: buffer overflow. A buffer overflow occurs when a program has reserved an amount of memory X for a variable in the memory space, but at the time of assigning its value, the value has a size greater than X. What … Read more

CTF: Game of Thrones

CTF: Game of Thrones

In this post I am going to make a proof of concept about how to make a CTF of a machine. This post is going to be longer than the rest, because the CTF is long and I have preferred to put it all together in one post instead of publishing several and to be … Read more

Steganography: the art of hiding

Steganography: the art of hiding

Steganography is the art of hiding. It consists of hiding messages in such a way that at first sight they are not perceived. It is based on the idea that deciphering an encrypted message is only a matter of time, but discovering a secret message is much more difficult if you don’t even know there … Read more

Introduction to honeypots

Introduction to honeypots

The biggest project that I faced in my university life was the end-of-degree project. For years I had been determined to dedicate myself to security, so my end-of-degree project had to be about security. It was then that I got in touch with Professor Álvaro Ortigosa, the current director of the Institute of Forensic Sciences … Read more

Malware PoC: How to do a Trojan Horse

Malware PoC: How to do a Trojan Horse

We all know them. They plague our computers. But how are viruses made? In general, talking about creating malware is rare in the area of cybersecurity, because unless you are dedicated to stopping it, there is no ethical reason why you should know how to develop malware. Or is it?  After all, a hacker seeks … Read more

Metasploit: introduction to pentesting

Metasploit: introduction to pentesting

Metasploit is an open source project created by H.D Moore that facilitates the exploitation of security vulnerabilities in intrusion tests. It is divided into modules that implement different functionalities, so it is extremely easy to increase the functions of the tool. Metasploit has 4 different interfaces: msfconsole, msfcli, Armitage and web. However, in this post … Read more

Configuring hacking enviroment: Kali vs Parrot

Configuring hacking enviroment: Kali vs Parrot

When you enter the world of computer security, the first thing you need to set up is your working environment. We must spend a good deal of time choosing where we will develop our hacking skills, and a good decision can make our journey a little easier. Here I will introduce you to the two … Read more

Introduction to Hack The Box

Introduction to Hack The Box

CTF (Capture The Flag) events are becoming increasingly popular in the IT world. Every week there are meetings where computer security lovers meet to demonstrate their hacking skills.  And the way hackers are trained for these events are the CTF labs, websites where you can find hundreds of challenges of different categories: web, pwn, steganography, … Read more