News

CrossLinked – Herramienta OSINT para el descubrimiento de emails

CrossLinked – OSINT tool for email discovery

Celia Catalán

One part of the OSINT methodology is finding information about people related to the target organization. CrossLinked is an open source tool that allows...

CrossLinked – OSINT tool for email discovery

Celia Catalán

One part of the OSINT methodology is finding information about people related to the target organization. CrossLinked is an open source tool that allows...

Burpsuit: Intruder

Burpsuit: Intruder

Celia Catalán

Good morning everyone! Today we will talk about one of the most used and powerful tools within Burp Suite itself to carry out Web audits. Burp Suite is a tool...

Burpsuit: Intruder

Celia Catalán

Good morning everyone! Today we will talk about one of the most used and powerful tools within Burp Suite itself to carry out Web audits. Burp Suite is a tool...

Análisis de Certificaciones de Ciberseguridad Ofensiva | Parte II

Analysis of Offensive Cybersecurity Certificati...

Celia Catalán

In the previous installment of Offensive Cybersecurity Certifications, we were talking about eJPT (Junior Penetration Tester) and eWPT (Web Penetration Tester). During today's delivery I will tell you...

Analysis of Offensive Cybersecurity Certificati...

Celia Catalán

In the previous installment of Offensive Cybersecurity Certifications, we were talking about eJPT (Junior Penetration Tester) and eWPT (Web Penetration Tester). During today's delivery I will tell you...

Coerce | Parte II

Coerce | Part II

Celia Catalán

Hello again everyone! As promised, we continue with the Coerce saga and in this second part we continue commenting on other vulnerable RPCs: MS-FSRVP MS-FSRVP Es el Remote Procedure C...

Coerce | Part II

Celia Catalán

Hello again everyone! As promised, we continue with the Coerce saga and in this second part we continue commenting on other vulnerable RPCs: MS-FSRVP MS-FSRVP Es el Remote Procedure C...

Análisis de Certificaciones de Seguridad Ofensiva | Parte I

Analysis of Offensive Security Certifications |...

Celia Catalán

Certifications play a crucial role in the world of cybersecurity, fulfilling two main functions. First of all, they help to acquire knowledge and skills in various areas...

Analysis of Offensive Security Certifications |...

Celia Catalán

Certifications play a crucial role in the world of cybersecurity, fulfilling two main functions. First of all, they help to acquire knowledge and skills in various areas...

Coerce | Parte 1

Coerce | Part 1

Celia Catalán

Within the Active Directory environment, attackers use forced authentication and MitM strategies to perform various actions. That is why, on this occasion, entering...

Coerce | Part 1

Celia Catalán

Within the Active Directory environment, attackers use forced authentication and MitM strategies to perform various actions. That is why, on this occasion, entering...