Category Archives: Hacking

Hacking Docker Remotely

The following is a write up for a challenge given during a Docker security workshop in the company I work for. It was a lot of fun and ironically I managed to complete the challenge not exactly how they were … Continue reading

Share
Posted in Capture the Flag, Code, Docker, Hacking | Tagged , , , , | Leave a comment

HP Data Protector Remote Shell for HPUX

In many pentest that I have done, HPUX is one of the more commons UNIX OS that I found. It is a strong operating system running in a robust hardware, and when I got to know more about the Lights … Continue reading

Share
Posted in Code, Exploits, Hacking, Security | Tagged , , , , , , , , , , , , , , , , | Leave a comment

Reunión CUM 2010

Hace poco el buen Nitrous me comentó que se iba a armar una reunión del CUM (Comunidad Underground Mexico, no piensen mal) y despues el buen HKM autor del sitio Hakim me comentó que podía difundirlo. Bueno, les hago extensiva … Continue reading

Share
Posted in Conferences, Events, Hacking | Tagged , , , , , , , , , , , | Leave a comment

Conferencia HUM – BugCon2010

Quiero invitarlos a mi conferencia de HUM – Homemade Undetectable Malware que voy a dar en la BugCon2010 este viernes 29 de octubre del 2010. Es parte de lo que dí en la conferencia del ITESM pero voy a agregarle … Continue reading

Share
Posted in Conferences, Events, Hacking, Presentations, Security | Tagged , , , , , , | 2 Comments

Conferencia: HUM – Homemade Undetectable Malware

Tengo el gusto de anunciarles que el Profesor Arturo García conocido en el Twitter cómo @ElProfeSeguro, me ha invitado a dar una conferencia sobre HUM o Homemade Undetectable Malware en el ITESM CCM. No quiero adelantar mucho de la conferencia … Continue reading

Share
Posted in Events, Hacking, Presentations, Security | Tagged , , , , , , , , , , | 3 Comments

Uncomplicated File Wipe for *NIX

We needed to guarantee to one of our customers that a file will be securely deleted. Since the server was a HPUX Unix and we can’t compile nor install new applications, I managed to write this script to wipe the … Continue reading

Share
Posted in Code, Hacking, Security | Tagged , , , , , , | Leave a comment

Infographic: A Short Story on Hacking

I found this great infographic about hacking and I thought in sharing it. I hope you found it as interesting as I did. Via: Online MBA Technorati Tags:hackarandas, adrian puente z., infographic, online mba, hackersGenerated By Technorati Tag Generator Adrián … Continue reading

Share
Posted in Hacking, Inphographic, Security | Tagged , , , , , , | Leave a comment

SSH Hacking and Good Practices

I got to confess that I am a big podcast fan and one I am fond of is PaulDotCom – Security Weekly (I also hear it while I am jogging) So when I read in the blog the Mark Baggett’s … Continue reading

Share
Posted in Articles, Hacking, Presentations, Security | Tagged , , , , | 2 Comments

BugCON Security Conference 2010

Translate to English BugCON Security Conference es un evento de seguridad meramente técnico en donde los mas importantes investigadores del área muestran sus últimos descubrimientos. En la edición 2008 BugCON fue catalogado como el evento de cómputo con nivel mas … Continue reading

Share
Posted in Events, Hacking, Security | Tagged , , , , , | Leave a comment

Fast MAC Address Changer in Linux

When you are making a pentest sometimes you need to be sneaky and have some tricks in your arsenal to cloak yourself in the network. But some sysadmins are skillfull in their incident response and, sometimes (not many in my … Continue reading

Share
Posted in Code, Hacking, Security | Tagged , , , , | Leave a comment