Google is one of the most famous search engines in the world. However, searching Google is an art that many people don’t quite understand. And…
Posts published in “Pentesting”
Today I bring a very special post. This publication has been delayed a couple of weeks because I was finishing polishing it, and I wanted it…
Have you ever been told that if you find a USB stick on the floor, you shouldn’t put it in your computer? Today I’ll show…
In this other post I talked about passwords and the conditions that must be met to be considered secure. However, if we enter the world’s…
Many times it is not necessary to hack into anything to get credentials or confidential data. Many developers have the strange habit of leaving sensitive…
Today we are going to talk about why in recent years we are constantly told that we must establish secure passwords if we want to…
In this new post I’m going to talk about one of the best known and most frequent techniques to find today: SQL injections. I will…
In this post I am going to make a proof of concept about how to make a CTF of a machine. This post is going…
A few days ago I read an article by Leon Juranic that discovered a new world of possibilities for me. The article is called “Back…
Metasploit is an open source project created by H.D Moore that facilitates the exploitation of security vulnerabilities in intrusion tests. It is divided into modules…