[Hacking series] – Zico2

Written by  on August 8, 2018

  First of all and after detecting our target machine with netdiscover we run a nmap portscan with nmap -T5 -Pn -sV Here we see that[...]

Identifying individuals in public events with social networks and computer vision

Written by  on May 5, 2018

Do you use to participate in public events such as demonstrations, rallies, strikes, illegal voting events, violent revolutions or such? Are you a fugitive[...]

Offensive security certs: OSCP and OSCE review

Written by  on April 30, 2018

Today I’m going to talk about a couple of certifications that I have from offensive-security.com. As a lot of your security researchers always wonder[...]

NcNLabs – Digging deeper, looking for exploits and malware in dark nets with scrapy

Written by  on April 29, 2018

The past month I was accepted to perform a talk-workshop about open source intelligence at the NcNLabs in Barcelona. NcNLabs is an initiative of noconname,[...]

Automating malware analysis, cuckoo api + postfix

Written by  on April 25, 2018

For our sandbox setup, we will need a cuckoo machine, in this case an Ubuntu 16.04 with 2GB of RAM and a sandbox machine which will be a windows xp sp3[...]