Contenido

Soy tan majo que te indexo mi contenido aquí abajo :)

Título del vídeo Fecha descripción tags links
¿Cómo encuentro todos los directorios donde el usuario actual puede escribir? 2024-03-21 La variable de entorno PATH en Linux contiene rutas de programas donde si podemos escribir abusaremos del sistema. Forjamos el comando que nos lista en qué directorios podemos escribir con el usuario actual [path_abuse] [ciberseguridad] [path] [which] [tr] [find] [command_substitution]
CmdChallenge #37: Rana 2024-03-18 ¿Puedes llegar a imprimir el contenido de un fichero contenido en un directorio juguetón ./.../ /. .theflag.txt? (3 soluciones) [cmdchallenge] [cat] [shell_expansion] [filename_expansion] [>] [find]
¿Cómo encuentro todos los ficheros ejecutables del usuario actual? 2024-03-14 Comando directo para encontrar todos los ficheros ejecutables interesantes (excluidos los del sistema operativo) del usuario actual. Ideal para buscar opciones para una escalada de privilegios. [privilege_escalation] [ciberseguridad] [stat] [find]
CmdChallenge #35: Pollito 2024-03-07 Resolución de CmdChallenge #35: Pollito [cmdchallenge] [find] [awk] [shell_expansion] [filename_expansion]
CmdChallenge #29: Vaca 2024-02-04 Resolución de CmdChallenge #29: Vaca [cmdchallenge] [find] [basename] [grep] [filename_expansion] [shell_expansion]
CmdChallenge #28: Unicornio 2024-02-01 Resolución de CmdChallenge #28: Unicornio [cmdchallenge] [find] [sort] [uniq] [xargs] [dirname] [filename_expansion] [shell_expansion]
CmdChallenge #26: Tigre 2024-01-25 Resolución de CmdChallenge #26: Tigre [cmdchallenge] [find] [rename] [sh] [mv] [cut] [command_substitution] [shell_expansion]
Cómo encontrar todos los ficheros de un usuario concreto. 2024-01-23 Comando para encontrar todos los ficheros propiedad de un usuario concreto [find] [grep]
CmdChallenge #25: Leona 2024-01-10 Resolución de CmdChallenge #25: Leona [cmdchallenge] [find] [basename] [xargs] [sed]
CmdChallenge #23: Zorro 2024-01-10 Resolución de CmdChallenge #23: Zorro [cmdchallenge] [find] [sed] [filename_expansion] [shell_expansion]

1 2 3 4

[] [!] [!!] [!$] [!n] [!~] [$!] [$#] [$$] [$((...))] [$(...)] [$*] [$-] [$0] [$?] [$@] [$n] [${#...}] [&] [&&] [&>] [(...)] [*] [**] [.] [...] [.bash_profile] [.bashrc] [:>] [<] [<&] [<(...)] [<<] [<<<] [<>] [=~] [>] [>&] [>(...)] [>>] [?] [Linux] [ag] [airodump-ng] [alias] [antergos] [apt] [arch] [arithmetic_expansion] [array] [array_expansion] [atajo] [awk] [backdoor] [backup] [basename] [bash] [bash_serie] [bats] [bc] [benchmarking] [bg] [bin] [bios] [boot] [brace_expansion] [break] [builtin] [cache] [cat] [cd] [chainload] [chmod] [chown] [chroot] [ciberdelincuente] [ciberseguridad] [cifrado] [clear] [clipboard] [cmdchallenge] [cobaltStrike] [command] [command_substitution] [config] [configuracion] [consejo] [continue] [contraseña] [coproc] [cp] [crontab] [crunchbang] [csv] [curl] [cut] [cygwin] [damnsmalllinux] [date] [dd] [debate] [debian] [declare] [deluser] [demonio] [desarrollo] [diff] [dir] [directorio] [directory stack] [dirname] [dirs] [disco] [disown] [distro] [distro hopping] [dni] [dos] [dotglob] [dpkg] [driver] [dualboot] [dxvk] [echo] [edubuntu] [elementaryos] [elf] [else] [emacs] [email] [enable] [encryption] [endeavouros] [enlace] [env] [etc] [eval] [exec] [exercism] [export] [factor] [fc] [fd] [fedora] [fg] [fifo] [file] [filename_expansion] [find] [font] [for] [fsck] [fuduntu] [fuerza_bruta] [garuda] [gentoo] [git] [globstar] [go] [grep] [grub] [grupo] [hacker] [hackerrank] [hackmyvm] [hash] [head] [help] [heredoc] [herestring] [herramienta] [history] [history_expansion] [home] [htop] [humor] [ia] [if] [if-elif-else] [ifconfig] [ingenieria_social] [inyeccion] [ip] [jobs] [journald] [jq] [json] [kali] [kernel] [kill] [killall] [korora] [kubuntu] [ld] [less] [let] [leviathan] [libreria] [linux] [linux_explained] [linux_inc] [linuxlite] [ln] [log] [logrotate] [ls] [ltrace] [lubuntu] [man] [man_express] [mandriva] [manjaro] [mapfile] [md5sum] [metadatos] [mint] [mkdir] [mkfifo] [mktemp] [more] [mount] [musica] [mv] [mxlinux] [nano] [nc] [ncdu] [nmap] [nobara] [nvidia] [obsidian] [opensuse] [overthewire] [owasp] [pajaro] [parrotos] [passwd] [password] [paste] [path] [path_abuse] [peppermint] [permisos] [permisos_especiales] [personalizacion] [pgrep] [phishing] [pop!_os] [popd] [posix] [printenv] [printf] [privilege_escalation] [proceso] [process_substitution] [procfs] [prompt] [proton] [ps] [pstree] [puppylinux] [pushd] [pwd] [python] [q4os] [qalc] [qr] [qrcp] [ramdisk] [ransomware] [rbash] [read] [realpath] [redhat] [regex] [rename] [reverse_shell] [rm] [root] [rot] [rsync] [scammer] [scripting] [sed] [seq] [servidor] [set] [sh] [shell] [shell_expansion] [shell_function] [shellcheck] [shopt] [shortcut] [shuf] [signal] [slackware] [sort] [source] [spam] [split] [spool] [sql] [ssh] [stat] [steamos] [sticky_bit] [strings] [subshell] [substring] [substring_expansion] [sudo] [suid] [switch] [sysadmin] [sysfs] [syslog] [systemctl] [systemd] [sysv] [tac] [tail] [tee] [terminal] [test] [tienda_fraudulenta] [tilde_expansion] [tinycore] [tldr] [tmp] [tmpfs] [tmux] [touch] [tr] [transferencia] [trap] [tree] [tty] [ubuntu] [ubuntubudgie] [ubuntumate] [ubuntustudio] [udev] [uniq] [unset] [until] [unzip] [url] [useradd] [usermod] [venus] [videojuego] [vim] [vnc] [vscode] [vulcan] [wallapop] [wc] [whatsapp] [which] [while] [whoami] [wifi] [winamp] [windows] [winkex] [wl-clipboard] [wsl] [xargs] [xclip] [xdg-open] [xsel] [xubuntu] [xxd] [xz] [zombie] [zorin] [zsh] [{...}] [|] [||] [~]



Sobre mí

Hola, me llamo Juan y soy técnico en ciberseguridad. Tengo años de experiencia como analista de amenazas, investigador forense y desarrollador de software - adoro scrum.

Llevo un tiempo creando contenido, principalmente en TikTok y Youtube, poniendo el foco en Linux, el terminal, Bash scripting y otros temas relacionados con la ciberseguridad. Intento dar un toque de humor a todo lo que hago para trasladar mis conocimientos de una manera amena, didáctica y entretenida.