Skip to content
Cristian Thous – Ciberseguridad al alcance de todos
Ciberseguridad al alcance de todos
Cristian Thous - Ciberseguridad al alcance de todosCristian Thous - Ciberseguridad al alcance de todos
  • Home
  • News
  • Hacking
    • Methods of attack
    • Prevention methods
    • Connectivity methods
    • Windows hacking
    • Linux hacking
  • Research
  • Contact
  • Español
  • English
Search:
Instagram page opens in new windowFacebook page opens in new windowTelegram page opens in new window
  • Home
  • News
  • Hacking
    • Methods of attack
    • Prevention methods
    • Connectivity methods
    • Windows hacking
    • Linux hacking
  • Research
  • Contact
  • Español
  • English

Category Archives: Hacking EN

You are here:
  1. Home
  2. Category "Hacking EN"

Attack methods: Code Injection

Hacking EN, Methods of attackBy Cristian SantanaJanuary 23, 2024Leave a comment

Code injection is the general term for attack types that consist of injecting code that is then interpreted/executed by the application. This type of attack takes advantage of mismanagement of untrusted data. Requirements: Responsibility: In this tutorial we will use hacking techniques, with the only purpose of learning. We do not promote its use for…

How to configure PROXYCHAINS in KaliLinux via Terminal

Hacking EN, Linux hacking ENBy Cristian SantanaNovember 20, 2023Leave a comment

Proxychains is an open source software for Linux systems and comes pre-installed with Kali Linux, the tool redirects TCP connections through proxies such as TOR, SOCKS4, SOCKS5, and HTTP (S) and allows us to chain proxy servers. With proxychains, we can hide the IP address of the source traffic and evade IDS and firewalls. Requirements:…

Access Windows 10 without knowing the password

Hacking EN, Windows hacking ENBy Cristian SantanaNovember 20, 2023Leave a comment

Surely more than one has happened to you that you have forgotten the password of your windows or a Windows 10 that was in domain is not able to access the AD. In this tutorial I will show you how to enter the machine without knowing the password, either physical or virtual machine (in this…

DNSSEC What is it?

Hacking EN, Prevention methodsBy Cristian SantanaNovember 20, 2023Leave a comment

One of the cornerstones of the Internet is the Domain Name System, also known by its acronym DNS. The purpose of this protocol is to translate the domain names used by users into IP addresses that can be interpreted by machines. This protocol dates back to the 1980s, a time when functionality prevailed over security, and DNS was…

What is Kerberos, how does it work and what is it used for?

Connectivity methods, Hacking ENBy Cristian SantanaNovember 20, 2023Leave a comment

Cybercrime is an unfortunate fact of life today, regardless of whether we are talking about individual consumers or the business world in general. No company or organization is safe, and the problem is not going to get better any time soon. Experts predict that the damage caused by cybercrime will cost the world $6.1 trillion…

Attack methods: Clickjacking

Hacking EN, Methods of attackBy Cristian SantanaNovember 20, 2023Leave a comment

Clickjacking is an attack that tricks the user into clicking on a web page element that is invisible or disguised as another element. This can cause users to unintentionally download malware, visit malicious web pages, provide credentials or sensitive information, transfer money or purchase products online. Requirements: Responsibility: In this tutorial we will use hacking…

How to stop a DDoS attack?

Hacking EN, Prevention methodsBy Cristian SantanaNovember 14, 2023Leave a comment

Imagine your website is a store, Distributed Denial of Service (DDoS) is like a mob in front of your store that won’t let your customers in. It’s a nasty situation to have tens of thousands of fake shoppers eating up your valuable resources, all at once. Know how to stop DDoS attacks. DDoS has become…

AS2 protocol and differences with SFTP

Connectivity methods, Hacking ENBy Cristian SantanaOctober 18, 2023Leave a comment

How are sensitive sectors such as commercial airlines, healthcare or transport communicated and shared data? How do you transfer structured B2B data safely and reliably through risk networks like the Internet? The answer is the AS2 protocol. What is AS2? Applicability Statement 2 ( AS2 ) is a type of file transfer mechanism based on…

Methods of attack: Brute Force Attack

Hacking EN, Methods of attackBy Cristian SantanaOctober 17, 2023Leave a comment

What is the brute force attack method? A brute force attack uses the trial and error method to guess access information, encryption keys, or find a hidden web page. Hackers work through all possible combinations in hopes of guessing correctly. These attacks are carried out by « brute force », which means that they use…

SQL Injection with sqlmap

Hacking EN, Web Hacking ENBy Cristian SantanaOctober 16, 2023Leave a comment

What is SQLmap? SQLmap is a tool developed in python to automate attacks of the SQL Injection type. Its objective is to detect and take advantage of existing vulnerabilities in web applications. Once one or more possible injections have been detected, the user has the possibility to choose from a variety of options, such as listing…

←123→
Cristian Thous - Ciberseguridad al alcance de todos
Pagina creada por Unic Services
Go to Top
Utilizamos cookies en nuestro sitio web para ofrecerle la experiencia más relevante al recordar sus preferencias y visitas repetidas. Al hacer clic en "Aceptar", consiente el uso de TODAS las cookies.
Configuración de las cookiesAceptar
Manage consent

Resumen de la privacidad

Este sitio web utiliza cookies para mejorar su experiencia mientras navega por el sitio web. De ellas, las cookies clasificadas como necesarias se almacenan en su navegador, ya que son esenciales para el funcionamiento de las funciones básicas del sitio web. También utilizamos cookies de terceros que nos ayudan a analizar y comprender cómo utiliza usted este sitio web. Estas cookies se almacenan en su navegador sólo con su consentimiento. También tiene la opción de excluirse de estas cookies. Pero la exclusión de algunas de estas cookies puede afectar a su experiencia de navegación.
Necesario
SAVE & ACCEPT
Responsibility

On this website you will find news and content related to cybersecurity, also hacking techniques are used, with the sole purpose of learning. We do not promote its use for profitable or improper purposes. We are not responsible for any damage or impairment that may be generated in the systems used. The responsibility is entirely the user’s.