Planning and Designing Technical Audits
Planning and Designing Technical Audits: Essential Points for …
Resources for training and awareness in Cybersecurity
Resources for Cybersecurity Awareness: Phishing, BadUSB, Ransomware, …
How to use censored applications while maintaining anonymity and privacy.
Strategies for accessing censored or restricted software while …
Master SOC on BOX: Implementation of a SIEM/SOC service – (Part 2).
Implementation and launch of a SIEM/SOC …
Master SOC on BOX: Implementation of a SIEM/SOC service – (Part 1).
Implementation and launch of a SIEM/SOC …
Actions to be taken in case of hijacking or loss of GMAIL account credentials
1. Introduction The purpose of this article is to provide recommended …
Securing our devices against potential espionage.
1. Introduction In this article, we will provide guidelines on how to …
What should we do if we become victims of ransomware?
1. What is ransomware and what impact does it have? In this article, …
Capture The Flag (CTF) Deloitte – CyberAcademy
1. Introduction and Objectives In this article, we will provide a …
Physical Security: Access Card Cloning with Proxmark in Red Team Operations
1. Introduction and Objectives In this article, we will explore how …
Anonymous Connection, Information Exfiltration, and Covering Tracks in Red Team Operations (RTO)
1. Introduction and Objectives In this article, we will demonstrate …
Publishing a website or files on the Deep Web using a Raspberry Pi anonymously (OnionShare).
1. Introduction and Objectives In this article, we will demonstrate …
Analysis and Reverse Engineering of a Banking Trojan Malware from the Zeus Family
1. Introduction and Objectives In this article, we will demonstrate …
Attack Using BadUSB Devices or Rubber Ducky
1. Introduction and Objectives In this article, we will conduct a …
Capture The Flag CTF 2 Jaymon Security – Pentesting
1. Introduction and Objectives In this article, we will provide a …
Remote Desktop Attacks – Ransomware Entry
1. Introduction and Objectives In this article, we will briefly …
SPLUNK: The Ultimate SIEM for Control
1. Introduction and Objectives In this article, we will step into the …
REVERSING: Study and programming of a KEYGEN.
1. Introduction and Objectives In this article, we are going to …
Analysis of Malware in Android
1. Introduction and Objectives In this article, we will conduct the …
Vulnerability Analysis in Android Applications (2)
1. Introduction and Objectives In this article, we will continue with …
Vulnerability Analysis in Android Applications (1)
1. Introduction and Objectives According to “OWASP Mobile …
Covering Tracks After an Intrusion
1. Introduction and Objectives This phase, not covered in the cycle …
Man In The Middle (MITM): Capturing Credentials with SSLStrip2 and Delorean
Introduction and Objectives This attack, as its name suggests, …
Netcat, Cryptcat, and Ncat: The Swiss Army knives of hacking.
Introduction and objectives We are going to study the functioning and …
Understanding a DNS Spoofing + Phishing Attack
What is a DNS Spoofing and Phishing attack? The term …
Understanding a DNS Spoofing Attack + Evilgrade
What does this type of attack consist of? One of the most dangerous …


