Try Hack Me | Overpass | Write Up
Hey there, Cyber Warriors! 🚀 Today we will see another CTF write up but now from Try Hack Me. I did this CTF in one of the workshops in IT-S …
Perseguimos la "In-Seguridad" informática
Hey there, Cyber Warriors! 🚀 Today we will see another CTF write up but now from Try Hack Me. I did this CTF in one of the workshops in IT-S …
The realm of cybersecurity is as vast as it is intriguing, and every once in a while, a challenge comes along that truly tests our mettle as ethical hackers. Such …
In the vast world of cybersecurity, sometimes, it’s the smallest of details that can lead to the biggest breakthroughs. It’s no surprise then, that in my recent foray into the …
Diving deep into the realms of ⚔️ HackTheBox 👽, I took on one of its most challenging monsters: Reddish! After a week of intense battles, deciphering and decoding, I can …
Just tackled the ‘Stocker’ machine on #HackTheBox. Loved the explotation of web vulnerabilities and the challenge of the injections! If you’re into #CTF, this is a must try! 🚀 #CyberSecurity …
Just tackled the ‘Inject’ machine on #HackTheBox. Loved the exploration of high ports and the challenge of the injection exploitation! If you’re into #CTF, this is a must try! 🚀 …
Hey there, Cyber Warriors! 🚀 Cracking the code, stepping into the mind of the creator, and uncovering secrets no one else has discovered yet — this is the thrill of …
Hey there, Cyber Warriors! 🚀 Get ready for a thrilling exploration of MonitorsTwo, a remarkable CTF challenge from Hack The Box! A test of wits and cybersecurity skills, MonitorsTwo takes …
Hey there, Cyber Warriors! 🚀 Guess what? I recently had a wild ride with the Busqueda CTF challenge and I can’t wait to share the adventure with you. This challenge …
Hoy, me complace profundizar en «¿Cómo preparar la certificación eCPPTv2 (Certified Professional Penetration Tester)?», una credencial que he obtenido recientemente y que ha marcado un punto de inflexión significativo en …
La ciberseguridad es un campo en constante evolución y con una demanda creciente. Si acabas de terminar tus estudios universitarios/educación y te preguntas cómo comenzar en ciberseguridad, este post (y …
El buffer overflow ha sido durante mucho tiempo una de las vulnerabilidades más conocidas y explotadas en el mundo de la ciberseguridad. A pesar de las protecciones modernas, entender cómo …