In this post I am going to make a proof of concept about how to make a CTF of a machine. This post is going…
Hacking Lethani
Steganography is the art of hiding. It consists of hiding messages in such a way that at first sight they are not perceived. It is…
The biggest project that I faced in my university life was the end-of-degree project. For years I had been determined to dedicate myself to security,…
A few days ago I read an article by Leon Juranic that discovered a new world of possibilities for me. The article is called “Back…
We all know them. They plague our computers. But how are viruses made? In general, talking about creating malware is rare in the area of…
Metasploit is an open source project created by H.D Moore that facilitates the exploitation of security vulnerabilities in intrusion tests. It is divided into modules…
When you enter the world of computer security, the first thing you need to set up is your working environment. We must spend a good…
CTF (Capture The Flag) events are becoming increasingly popular in the IT world. Every week there are meetings where computer security lovers meet to demonstrate…