I’m very interested in cybersecurity and I’m studying it on my own alongside computer engineering. In order to improve this research, I decided to organize an intense studying sprint in cybersec, and jumping into “semi professional” projects, using Zerodium and similar. Before presenting a formal vulnerability to these pages, I want to prepare myself. I’m used to work with Network System Monitoring and similar, but I want to reach a wider action zone.

This week I started looking for resources, books, pages and inspiration. I read a couple of books, but they seemed quite for begginners (as they firstly speak...


Many people has heard about Bitcoins, the decentralized virtual currency, but as famous as it could be, most of the population doesn’t know exactly what it is and how it works, not to mention is barely used.

What are BITCOINS?

A Bitcoin is a decentralized, worldwide, virtual currency system. It’s a peer-to-peer distributed system in which users own a key that are usually stored in digital wallets on each user’s computer, and that key is used to prove the ownership of a transaction unblocking the value and letting different owners use it....


You might have heard about the technique of Ducky debugging in which you tell a rubber ducky your dev problems and then you know how to solve them, but this is not the case, we are talking about nasty duckies here, not cute problem solvers ones.

Regardless the name, Rubber Ducky is the name of a hacking injection device that consist in a pen drive and a micro SD. The pack itself also comes with the case, and a couple of USB adapters.

The device imitates the human keyboard input, “Humans use...


I’m a very chaotic person, and I tend to forget the date for returning books to the library, for example. The last time I went to the local library, I wanted to take out a book, but apparently my library id-card was very old (I still had the junior card) and the new library assistant asked me to change it. In the process, I felt quite insecure to whom I was giving my information to. To start with, all the system seemed to rely on Windows 95, which already gave me the thrills, but apart from that, all the process...


La encriptación y los números primos

Todos utilizamos sin darnos cuenta los números primos al entrar a nuestra cuenta del banco, al pagar en bitcoins o cuando nos metemos en cualquier web que use el protocolo HTTPS. ¿En qué se usan para estas aplicaciones?
La respuesta es sencilla: en la encriptación.
Para empezar tenemos que repasar qué conocemos por encriptación y cómo funciona.


La encriptación se encarga de, a partir de un mensaje, convertirlo en una maraña de números, letras o cualquier otra cosa que no nos sea fácilmente legible y no nos permita volver...