SQL Injection: Introduction

SQL Injection: Introduction

In this new post I’m going to talk about one of the best known and most frequent techniques to find today: SQL injections. I will make a very simple introduction to initiate those who do not know how to perform these types of attacks, and then explain other types of SQL Injection more complicated. The … Read more

Buffer Overflow

Buffer Overflow

In this post we will talk about how one of the oldest computer attacks occurs: buffer overflow. A buffer overflow occurs when a program has reserved an amount of memory X for a variable in the memory space, but at the time of assigning its value, the value has a size greater than X. What … Read more

CTF: Game of Thrones

CTF: Game of Thrones

In this post I am going to make a proof of concept about how to make a CTF of a machine. This post is going to be longer than the rest, because the CTF is long and I have preferred to put it all together in one post instead of publishing several and to be … Read more

Malware PoC: How to do a Trojan Horse

Malware PoC: How to do a Trojan Horse

We all know them. They plague our computers. But how are viruses made? In general, talking about creating malware is rare in the area of cybersecurity, because unless you are dedicated to stopping it, there is no ethical reason why you should know how to develop malware. Or is it?  After all, a hacker seeks … Read more

Metasploit: introduction to pentesting

Metasploit: introduction to pentesting

Metasploit is an open source project created by H.D Moore that facilitates the exploitation of security vulnerabilities in intrusion tests. It is divided into modules that implement different functionalities, so it is extremely easy to increase the functions of the tool. Metasploit has 4 different interfaces: msfconsole, msfcli, Armitage and web. However, in this post … Read more