Un informático en el lado del mal: ¡Ojo con los acosadores en Tinder! En cada...
Debo reconocer que soy una de las víctimas de la aplicación de citas por excelencia, Tinder. Gracias a este servicio pensé que encontraría a mi pareja ideal, pero lo que no imaginé nunca es que la...
View ArticleSANS Internet Storm Center, InfoCON: green: Data Classification For the...
Data classification isnt a brand new topic. For a long time, international organizations or military are doing data classification. It can be defined as:A set of processes and tools to help the...
View Article/dev/random: [SANS ISC Diary] Data Classification For the Masses
I published the following diary on isc.sans.org: “Data Classification For the Masses“.Data classification isn’t a brand new topic. For a long time, international organizations or military are doing...
View ArticleKPNC: vulnerability in… WinCalc (Win7, x64)
I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...
View ArticleArsTechnica: Security Content: How the NSA snooped on encrypted Internet...
Enlarge (credit: NSA)In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have...
View ArticleUn informático en el lado del mal: Cómo te estafan 1.282 € por un falso piso...
En verano el mercado de los alquileres se acelera, aprovechando que muchos estudiantes finalizan sus carreras, que empleados cambian de trabajo o que la gente quiere tomarse unas largas y merecidas...
View ArticleDarknet - The Darkside: PowerOPS – PowerShell Runspace Portable Post...
PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell “easier”. PowerOPS is an application written in C# that does not rely on powershell.exe but runs...
View ArticleSANS Internet Storm Center, InfoCON: green: What are YOU doing to give back...
Someone has played a large role in helping us become inspired and motivated to develop as an information security practitioner.We certainly did not get where we are today on our own.Without a doubt, I...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleUn informático en el lado del mal: Entrevista en "Las tardes del ciudadano...
Al comienzo del verano de este año fui invitado a pasar una tarde en Radio Nacional de España para ser entrevistado en el programa "Las tardes del ciudadano García" y hablar de todo un poco. La...
View ArticleSANS Internet Storm Center, InfoCON: green: Cisco ASA SNMP Remote Code...
Looking back through all the vulnerabilities announced this week, one caught my eye. CVE-2016-6366 is a vulnerability in the Cisco ASA products which could allow a remote attacker to remotely execute...
View ArticleLost In Security: Españoles por la BlackHat
Siguiendo con la estela del artículo publicado 'Españoles por la Phrack', vuelvo a la carga con un artículo parecido, pero en este caso sobre una de las conferencias de seguridad que más conoce la...
View ArticleDidier Stevens: Update: xor-kpa.py Version 0.0.3 With Man Page
This new version has a man page now (option -m):Usage: xor-kpa.py [options] filename-plaintext [filename-ciphertext] XOR known-plaintext attack Predefined plaintext: dos: This program cannot be run in...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, August...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleUn informático en el lado del mal: Alejandro Ramos se incorpora a Telefónica...
Hoy lunes 22 de Agosto es el primer día en el que Telefónica estrena un nuevo CISO dentro de la estructura del equipo de Seguridad Corporativa. Como ya os he anticipado en el título, el nuevo CISO será...
View ArticleInfosec Events: Week 34 In Review – 2016
Events RelatedImpressions From DEF CON 24: The Machines Are Rising– securityintelligence.com DEF CON 24, the world’s largest hacker conference, ended Aug. 7, and I must say I enjoyed every moment of...
View ArticleDarknet - The Darkside: IGHASHGPU – GPU Based Hash Cracking – SHA1, MD5 & MD4
IGHASHGPU is an efficient and comprehensive command line GPU based hash cracking program that enables you to retrieve SHA1, MD5 and MD4 hashes by utilising ATI and nVidia GPUs. It even works with...
View ArticleSANS Internet Storm Center, InfoCON: green: Red Team Tools Updates: hashcat...
Two kits favored by red teams and penetration testers have been updated recently, namely hashcat and SpiderFoot. Hashcat and SpiderFoot together read like a Robert Redford/Paul Newman movie title (yes,...
View ArticleArsTechnica: Security Content: Hints suggest an insider helped the NSA...
This is not what NSA's TAO is doing right now. A group called the Shadow Brokers made headlines this month by leaking a hacking tool belonging to the NSA's Tailored Access Operations (TAO) team. Now...
View ArticleUn informático en el lado del mal: Nuevo Módulo para Metasploit: Windows 7&10...
Hace unos días publicamos información sobre la vulnerabilidad descubierta por Matt Graeber y Enigma0x3 que permitía realizar un Bypass de UAC en entornos Windows 7 & Windows 10. Me puse manos a la...
View Article