Blog

Planning and Designing Technical Audits
Resources for training and awareness in Cybersecurity
How to use censored applications while maintaining anonymity and privacy.
Phishing Campaign with Gophish – Practice.
Risk analysis for a Company – Magerit practice 3.1
Legislation and Data Protection – Risk Analysis (2).
Legislation and Data Protection – Risk Analysis (1).
Master SOC on BOX: Implementation of a SIEM/SOC service – (Part 2).
Master SOC on BOX: Implementation of a SIEM/SOC service – (Part 1).
PDCA Model of ISMS and Certification Audit
Value of a Certification – ISO 27000 Series
Principles, program, and planning of audit and governance.
Physical Security: Access Card Cloning with Proxmark in Red Team Operations (2)
Complete guide on cold wallets for Cryptocurrencies
How can I send and share information anonymously?
What can happen if our social media accounts, email, or other applications are stolen from us?
Actions to be taken in case of hijacking or loss of GMAIL account credentials
Securing our devices against potential espionage.
What should we do if we become victims of ransomware?
Capture The Flag (CTF) Deloitte – CyberAcademy
Physical Security: Access Card Cloning with Proxmark in Red Team Operations
Anonymous Connection, Information Exfiltration, and Covering Tracks in Red Team Operations (RTO)
Publishing a website or files on the Deep Web using a Raspberry Pi anonymously (OnionShare).
Analysis and Reverse Engineering of a Banking Trojan Malware from the Zeus Family
Attack Using BadUSB Devices or Rubber Ducky
Capture The Flag CTF 2 Jaymon Security – Pentesting
How to Create a Script for SQL Injection Testing
Remote Desktop Attacks – Ransomware Entry
Exploiting: Buffer Overflow (BoF)
SPLUNK: The Ultimate SIEM for Control
REVERSING: Study and programming of a KEYGEN.
Implementing Scripts in Metasploit (Proof of Concept)
Analysis of Malware in Android
Vulnerability Analysis in Android Applications (2)
Vulnerability Analysis in Android Applications (1)
Covering Tracks After an Intrusion
Man In The Middle (MITM): Capturing Credentials with SSLStrip2 and Delorean
Netcat, Cryptcat, and Ncat: The Swiss Army knives of hacking.
Analysis of the EvilPDF tool
Understanding a DNS Spoofing + Phishing Attack
Understanding a DNS Spoofing Attack + Evilgrade
Spain