{"version":1,"pages":[{"id":"suXsA7ETgO3mWcCjgmVr","title":"Welcome","pathname":"/","siteSpaceId":"sitesp_q3eSm","emoji":"1f30e","description":"Transformar y personalizar todo el ecosistema relacionado con la parte visual y funciona de Kali Linux para adecuarlo a una mejor productividad en el trabajo de pentesting."},{"id":"FHANjcy5GXf0iAHuX8Kr","title":"DockerLabs (Español)","pathname":"/write-ups/dockerlabs-espanol","siteSpaceId":"sitesp_q3eSm","emoji":"1f433","description":"Documentación de los write-ups de máquinas con Dockerfiles, detallando la resolución paso a paso, análisis de vulnerabilidades y aprendizajes en ciberseguridad","breadcrumbs":[{"label":"WRITE-UPS"}]},{"id":"qcDCQypXT9aYwbGk4vTz","title":"Máquina INJECTION","pathname":"/write-ups/dockerlabs-espanol/maquina-injection","siteSpaceId":"sitesp_q3eSm","description":"Dificultad: Muy fácil","breadcrumbs":[{"label":"WRITE-UPS"},{"label":"DockerLabs (Español)","emoji":"1f433"}]},{"id":"y0Riph8rLCjw9Fac8Bqi","title":"Máquina TRUST","pathname":"/write-ups/dockerlabs-espanol/maquina-trust","siteSpaceId":"sitesp_q3eSm","description":"Dificultad: Muy fácil","breadcrumbs":[{"label":"WRITE-UPS"},{"label":"DockerLabs (Español)","emoji":"1f433"}]},{"id":"bewCoQ6q0obsOKJiQQ8A","title":"Máquina BREAKMYSSH","pathname":"/write-ups/dockerlabs-espanol/maquina-breakmyssh","siteSpaceId":"sitesp_q3eSm","description":"Dificultad: Muy fácil","breadcrumbs":[{"label":"WRITE-UPS"},{"label":"DockerLabs (Español)","emoji":"1f433"}]},{"id":"REkTd3e96QPaEI4E0PwM","title":"Máquina FIRSTHACKING","pathname":"/write-ups/dockerlabs-espanol/maquina-firsthacking","siteSpaceId":"sitesp_q3eSm","description":"Dificultad: Muy fácil","breadcrumbs":[{"label":"WRITE-UPS"},{"label":"DockerLabs (Español)","emoji":"1f433"}]},{"id":"E5lky5t7sDoHMZ31GM3o","title":"Exámen eJPTv2","pathname":"/write-ups/examen-ejptv2","siteSpaceId":"sitesp_q3eSm","emoji":"1f47d","description":"El examen eJPTv2 (eLearnSecurity Junior Penetration Tester v2) es una certificación diseñada para personas que están comenzando en el campo de la seguridad informática y la prueba de penetración.","breadcrumbs":[{"label":"WRITE-UPS"}]},{"id":"qRmfrmYtTUqgmSpZbwSS","title":"Laboratorio Xerosec eJPTv2","pathname":"/write-ups/examen-ejptv2/laboratorio-xerosec-ejptv2","siteSpaceId":"sitesp_q3eSm","description":"Dificultad: Difícil","breadcrumbs":[{"label":"WRITE-UPS"},{"label":"Exámen eJPTv2","emoji":"1f47d"}]},{"id":"tbKu1E6DRDHhhnjBmGXB","title":"TryHackMe","pathname":"/tryhackme","siteSpaceId":"sitesp_q3eSm","emoji":"2697"},{"id":"lsk8pyWeXIxn1gUC8iuR","title":"OhSint","pathname":"/tryhackme/ohsint","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"TryHackMe","emoji":"2697"}]},{"id":"YzZ1RPOt4oE5UEG2rtrz","title":"The Hackers Lab","pathname":"/the-hackers-lab","siteSpaceId":"sitesp_q3eSm","emoji":"1f3ea"},{"id":"7L3FcID0LGeRiJXpLjof","title":"Máquina Post-it","pathname":"/the-hackers-lab/maquina-post-it","siteSpaceId":"sitesp_q3eSm","description":"Dificultad: Muy fácil","breadcrumbs":[{"label":"The Hackers Lab","emoji":"1f3ea"}]},{"id":"ogHSXD6s47nJjTK1aT4F","title":"Máquina JaulaCon2025","pathname":"/the-hackers-lab/maquina-jaulacon2025","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"The Hackers Lab","emoji":"1f3ea"}]},{"id":"Sn5x05P2YPqbD1Whaldw","title":"TSS Ciberseguridad","pathname":"/tss-ciberseguridad","siteSpaceId":"sitesp_q3eSm","emoji":"1f6e1"},{"id":"czeR0YNTNcDAULh7gDAI","title":"¿Cómo proteger tu coche frente al robo a través del puerto OBD2?","pathname":"/articulos/como-proteger-tu-coche-frente-al-robo-a-traves-del-puerto-obd2","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Artículos"}]},{"id":"jQdtE0lPiCrJUxXvKmxm","title":"El Movimiento “Hacking is Not a Crime” y la Revalorización del Término \"Hacker\"","pathname":"/articulos/el-movimiento-hacking-is-not-a-crime-y-la-revalorizacion-del-termino-hacker","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Artículos"}]},{"id":"YCZVdG0dyH92rMQQGayv","title":"¿Qué es BurpSuite?","pathname":"/academia-burp-suite/que-es-burpsuite","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Academia Burp Suite"}]},{"id":"FyXiu4kzhjM122euKDnu","title":"Port Swigger","pathname":"/academia-burp-suite/port-swigger","siteSpaceId":"sitesp_q3eSm","description":"","breadcrumbs":[{"label":"Academia Burp Suite"}]},{"id":"YGS6VdFbyTx4iwklZ46b","title":"Vulnerabilidades en el lado del servidor","pathname":"/academia-burp-suite/vulnerabilidades-en-el-lado-del-servidor","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Academia Burp Suite"}]},{"id":"69dhqdYddy7M7KB1IVCD","title":"Vulnerabilidades de autenticación","pathname":"/academia-burp-suite/vulnerabilidades-de-autenticacion","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Academia Burp Suite"}]},{"id":"WwkrBrOmEsf8995DmjGy","title":"Control de acceso","pathname":"/academia-burp-suite/control-de-acceso","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Academia Burp Suite"}]},{"id":"VbWFtqfTa5Yi7tlymJW6","title":"IA: Ataques de extracción de datos","pathname":"/hacksplaining/ia-ataques-de-extraccion-de-datos","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"hacksplaining"}]},{"id":"OCKCyPGuQhC6wdRS943q","title":"IA: Inyección Prompt","pathname":"/hacksplaining/ia-inyeccion-prompt","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"hacksplaining"}]},{"id":"nj0pFzso2jY1uvuViQpN","title":"OSINT: Recolección de información","pathname":"/herramientas/osint-recoleccion-de-informacion","siteSpaceId":"sitesp_q3eSm","description":"","breadcrumbs":[{"label":"Herramientas"}]},{"id":"2QTAOzkmKDYGFh4akr5m","title":"Fuzzing: Extraer directorios ocultos","pathname":"/herramientas/fuzzing-extraer-directorios-ocultos","siteSpaceId":"sitesp_q3eSm","description":"Nmap es","breadcrumbs":[{"label":"Herramientas"}]},{"id":"ndg7Iz84FUEBuBA107Uk","title":"DirB","pathname":"/herramientas/fuzzing-extraer-directorios-ocultos/dirb","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Fuzzing: Extraer directorios ocultos"}]},{"id":"oEQF1jyCr5wenI5X5rhc","title":"DirSearch","pathname":"/herramientas/fuzzing-extraer-directorios-ocultos/dirsearch","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Fuzzing: Extraer directorios ocultos"}]},{"id":"5Ce1ANTAkZU38ionUleq","title":"GoBuster","pathname":"/herramientas/fuzzing-extraer-directorios-ocultos/gobuster","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Fuzzing: Extraer directorios ocultos"}]},{"id":"RdsHW6njj0nbKdzRKUxP","title":"Escaneo protocolos y servicios","pathname":"/herramientas/escaneo-protocolos-y-servicios","siteSpaceId":"sitesp_q3eSm","description":"Nmap es","breadcrumbs":[{"label":"Herramientas"}]},{"id":"5DZACAe2UrVjYHGPic29","title":"Nmap","pathname":"/herramientas/escaneo-protocolos-y-servicios/nmap","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Escaneo protocolos y servicios"}]},{"id":"x0xOhirGz11fBYVbjNDl","title":"Escaneo de vulnerabilidades","pathname":"/herramientas/escaneo-de-vulnerabilidades","siteSpaceId":"sitesp_q3eSm","description":"Nmap es","breadcrumbs":[{"label":"Herramientas"}]},{"id":"dYUNXVqaEvHbDXGeGHa9","title":"Nmap","pathname":"/herramientas/escaneo-de-vulnerabilidades/nmap","siteSpaceId":"sitesp_q3eSm","description":"Nmap es uno de los pilares fundamentales de las pruebas de penetración. Es uno de los primeros comandos, si no el primero, que ejecutas antes de considerar en qué superficie de ataque enfocarte.","breadcrumbs":[{"label":"Herramientas"},{"label":"Escaneo de vulnerabilidades"}]},{"id":"pP3ZU3jsoxN5iATc2KYM","title":"Acunetix","pathname":"/herramientas/escaneo-de-vulnerabilidades/acunetix","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Escaneo de vulnerabilidades"}]},{"id":"EDjC92H86TqHdoTnUwuz","title":"Nessus","pathname":"/herramientas/escaneo-de-vulnerabilidades/nessus","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Escaneo de vulnerabilidades"}]},{"id":"YnM0UeATDmB6gI7iSUn6","title":"Nuclei","pathname":"/herramientas/escaneo-de-vulnerabilidades/nuclei","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Escaneo de vulnerabilidades"}]},{"id":"77sVHXyKfDZEdVUk2oiU","title":"Burp Suite Pro","pathname":"/herramientas/escaneo-de-vulnerabilidades/burp-suite-pro","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Escaneo de vulnerabilidades"}]},{"id":"zXLfr4DEbe6fmHOppjyD","title":"Zap","pathname":"/herramientas/escaneo-de-vulnerabilidades/zap","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Escaneo de vulnerabilidades"}]},{"id":"ZYRJZy9V6M0ASiXyKRVF","title":"Análisis de aplicaciones","pathname":"/herramientas/analisis-de-aplicaciones","siteSpaceId":"sitesp_q3eSm","description":"Nmap es","breadcrumbs":[{"label":"Herramientas"}]},{"id":"Oc3r66H97zaEbnLURdsz","title":"Burp","pathname":"/herramientas/analisis-de-aplicaciones/burp","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Análisis de aplicaciones"}]},{"id":"FwhlvU5oDiAmyxz2J4Eq","title":"Ffuz","pathname":"/herramientas/analisis-de-aplicaciones/ffuz","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Análisis de aplicaciones"}]},{"id":"tp5ejULTUBIjwKsIcSbA","title":"Ataques de diccionario","pathname":"/herramientas/ataques-de-diccionario","siteSpaceId":"sitesp_q3eSm","description":"Nmap es","breadcrumbs":[{"label":"Herramientas"}]},{"id":"Idm9Ccv36VFVCO9lMrNj","title":"Xhtdra","pathname":"/herramientas/ataques-de-diccionario/xhtdra","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Ataques de diccionario"}]},{"id":"8ITo6NEf3FeimYjZ99cM","title":"Metasploit","pathname":"/herramientas/ataques-de-diccionario/metasploit","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Herramientas"},{"label":"Ataques de diccionario"}]},{"id":"F78yvqHTiQQEy1Co0YQy","title":"Fuerza bruta","pathname":"/herramientas/fuerza-bruta","siteSpaceId":"sitesp_q3eSm","description":"Nmap es","breadcrumbs":[{"label":"Herramientas"}]},{"id":"x4Bct4JkgpYJjNuhWJR5","title":"Hydra","pathname":"/herramientas/fuerza-bruta/hydra","siteSpaceId":"sitesp_q3eSm","description":"Es una herramienta de fuerza bruta y ataques de diccionario. Su objetivo principal es automatizar intentos de inicio de sesión contra servicios y protocolos para identificar debilidades.","breadcrumbs":[{"label":"Herramientas"},{"label":"Fuerza bruta"}]},{"id":"Y9GICpYmgnF973gBVdst","title":"Módulo 01","pathname":"/google-cibersecurity/modulo-01","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Google Cibersecurity"}]},{"id":"YuaqATZW2mad4ncygiew","title":"01 - Introducción a la Ciberseguridad","pathname":"/google-cibersecurity/modulo-01/01-introduccion-a-la-ciberseguridad","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Google Cibersecurity"},{"label":"Módulo 01"}]},{"id":"ernQONsTZj3OB6AXyxh5","title":"02 - Certificado de Ciberseguridad de Google","pathname":"/google-cibersecurity/modulo-01/02-certificado-de-ciberseguridad-de-google","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Google Cibersecurity"},{"label":"Módulo 01"}]},{"id":"mxMbZwFXsuNiyiuKxW4J","title":"03 - Competencias básicas para los profesionales de la Ciberseguridad","pathname":"/google-cibersecurity/modulo-01/03-competencias-basicas-para-los-profesionales-de-la-ciberseguridad","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Google Cibersecurity"},{"label":"Módulo 01"}]},{"id":"lqGDjtGi0rMnekoF6jTF","title":"Módulo 02","pathname":"/google-cibersecurity/modulo-02","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Google Cibersecurity"}]},{"id":"8z69oZbEB7eqYBiuWUE9","title":"01 - Historia de la ciberseguridad","pathname":"/google-cibersecurity/modulo-02/01-historia-de-la-ciberseguridad","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Google Cibersecurity"},{"label":"Módulo 02"}]},{"id":"YalQBZdGX95LQvnNE2uq","title":"02 - Los ocho dominios de seguridad de CISSP","pathname":"/google-cibersecurity/modulo-02/02-los-ocho-dominios-de-seguridad-de-cissp","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Google Cibersecurity"},{"label":"Módulo 02"}]},{"id":"gHXuSFV0cY58qwiRAeKb","title":"Módulo 03","pathname":"/google-cibersecurity/modulo-03","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Google Cibersecurity"}]},{"id":"Zad4iKOrGVUwsejdzuv3","title":"01 - Marcos de seguridad","pathname":"/google-cibersecurity/modulo-03/01-marcos-de-seguridad","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"Google Cibersecurity"},{"label":"Módulo 03"}]},{"id":"YIEcTIlhoPLHeh3g4oBk","title":"Administración de Amenazas Cibernéticas","pathname":"/cisco-networking-academy/administracion-de-amenazas-ciberneticas","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"CISCO NETWORKING ACADEMY"}]},{"id":"IRBtbFpEsNA5APcvsUO5","title":"Módulo 1: Gestión y Cumplimiento","pathname":"/cisco-networking-academy/administracion-de-amenazas-ciberneticas/modulo-1-gestion-y-cumplimiento","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"CISCO NETWORKING ACADEMY"},{"label":"Administración de Amenazas Cibernéticas"}]},{"id":"mhGdqGuNUNm0VeUdK4gB","title":"Módulo 2: Pruebas de Seguridad de la Red","pathname":"/cisco-networking-academy/administracion-de-amenazas-ciberneticas/modulo-2-pruebas-de-seguridad-de-la-red","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"CISCO NETWORKING ACADEMY"},{"label":"Administración de Amenazas Cibernéticas"}]},{"id":"44lAJLsaGtWkapcNSGEZ","title":"Módulo 3: Inteligencia contra las Amenazas","pathname":"/cisco-networking-academy/administracion-de-amenazas-ciberneticas/modulo-3-inteligencia-contra-las-amenazas","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"CISCO NETWORKING ACADEMY"},{"label":"Administración de Amenazas Cibernéticas"}]},{"id":"GPyeqieSY29Ahg1i9ecu","title":"Módulo 4: Evaluación de vulnerabilidades de terminales","pathname":"/cisco-networking-academy/administracion-de-amenazas-ciberneticas/modulo-4-evaluacion-de-vulnerabilidades-de-terminales","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"CISCO NETWORKING ACADEMY"},{"label":"Administración de Amenazas Cibernéticas"}]},{"id":"xN6OzxOIaQiVDcR2G3wR","title":"Módulo 5: Administración de Riesgos y Controles de Seguridad","pathname":"/cisco-networking-academy/administracion-de-amenazas-ciberneticas/modulo-5-administracion-de-riesgos-y-controles-de-seguridad","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"CISCO NETWORKING ACADEMY"},{"label":"Administración de Amenazas Cibernéticas"}]},{"id":"o63gc8044m4aWXKQiuIk","title":"Módulo 6: Análisis Forense Digital y Respuesta a Incidentes","pathname":"/cisco-networking-academy/administracion-de-amenazas-ciberneticas/modulo-6-analisis-forense-digital-y-respuesta-a-incidentes","siteSpaceId":"sitesp_q3eSm","breadcrumbs":[{"label":"CISCO NETWORKING ACADEMY"},{"label":"Administración de Amenazas Cibernéticas"}]}]}