hacking series

[Hacking series] – Zico2

Written by  on August 8, 2018

  First of all and after detecting our target machine with netdiscover we run a nmap portscan with nmap -T5 -Pn -sV Here we see that[...]

Identifying individuals in public events with social networks and computer vision

Written by  on May 5, 2018

Do you use to participate in public events such as demonstrations, rallies, strikes, illegal voting events, violent revolutions or such? Are you a fugitive[...]

NcNLabs – Digging deeper, looking for exploits and malware in dark nets with scrapy

Written by  on April 29, 2018

The past month I was accepted to perform a talk-workshop about open source intelligence at the NcNLabs in Barcelona. NcNLabs is an initiative of noconname,[...]

Automating malware analysis, cuckoo api + postfix

Written by  on April 25, 2018

For our sandbox setup, we will need a cuckoo machine, in this case an Ubuntu 16.04 with 2GB of RAM and a sandbox machine which will be a windows xp sp3[...]

Threat detection with Snort – Win32.Noon

Written by  on April 24, 2018

In the previous post about snort, we were talking about what can this NIDS do for us as network administrators / security researchers in matters such as[...]