{"id":17635,"date":"2025-03-07T17:04:23","date_gmt":"2025-03-07T16:04:23","guid":{"rendered":"https:\/\/immune.institute\/?post_type=proyecto&#038;p=17635"},"modified":"2025-10-07T10:51:16","modified_gmt":"2025-10-07T08:51:16","slug":"simular-proteger-hacking-etico-debilidades","status":"publish","type":"proyectos","link":"https:\/\/immune.institute\/en\/proyectos\/simular-proteger-hacking-etico-debilidades\/","title":{"rendered":"Pretending to protect: How ethical hacking exposes weaknesses to be protected"},"content":{"rendered":"<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-f72ede8d wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"wp-block-paragraph\">The best defence is a good attack, or at least that is how it is in cybersecurity. From this concept comes the concept of pentesting, which allows weaknesses in a device, in this case a virtual machine, to be revealed and corrected.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Pentesting, or ethical hacking, simulates all kinds of attacks in order to find the weak points of a system that would not withstand a real attack, dedicating efforts to strengthen them and ensure that they will not be repeated. <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"card card-light wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-accent-1-color\">Carried out by<\/mark><\/strong> <a href=\"https:\/\/www.linkedin.com\/in\/andres-orozco007\/\" target=\"_blank\" rel=\"noopener\">Andr\u00e9s Orozco Nore\u00f1a<\/a> | <a href=\"https:\/\/www.linkedin.com\/in\/ernesto-l-1a790b37\/\" target=\"_blank\" rel=\"noopener\">Ernesto L\u00f3pez Bravo<\/a> | <a href=\"https:\/\/www.linkedin.com\/in\/luis-miguel-rodriguez-herrero-638834149\/\" target=\"_blank\" rel=\"noopener\">Luis Miguel Rodr\u00edguez<\/a><\/p>\n\n\n\n<p class=\"card card-light wp-block-paragraph\"><strong>Qualification<\/strong> <a href=\"https:\/\/immune.institute\/en\/programas\/master-online-de-ciberseguridad\/\">Cybersecurity Master<\/a><\/p>\n\n\n\n<p class=\"card card-light wp-block-paragraph\"><strong>Technologies<\/strong> DoubleTrouble | Kali Linux | Metasploit | NMAP | ARP | GoBuster | StegSeek | Steghide | Searchsploit | Hacker Kid | Hacker Kid | Searchsploit | Searchsploit | Searchsploit | Searchsploit | Hacker Kid<\/p>\n\n\n\n<p class=\"card card-light wp-block-paragraph\">\u2b50<strong>Best Capstone Award 2024<\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\">What is the motivation? <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Cybersecurity is key in an increasingly technological world and, at the moment, there is no more reliable way to understand how a cybercriminal works than by mimicking it. An ethical hacking process simulates a real attack, finding weaknesses and vulnerabilities, so that they can be addressed. In recent years, numerous techniques and procedures have emerged that allow these tests to be carried out more efficiently and to counter the advances of cybercrime.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Program aims <\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Carry out an exhaustive analysis of the existing vulnerabilities in the DoubleTrouble virtual machine with ethical hacking tools and techniques.<\/li>\n\n\n\n<li>Identify and assess the weaknesses present in the virtual machine.<\/li>\n\n\n\n<li>Propose mitigation measures to correct the vulnerabilities found.<\/li>\n\n\n\n<li>Document the analysis process and mitigation measures.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"873\" height=\"589\" src=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image18.png\" alt=\"\" class=\"wp-image-17654\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image18.png 873w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image18-256x173.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image18-512x345.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image18-768x518.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image18-18x12.png 18w\" sizes=\"(max-width: 873px) 100vw, 873px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\">Development <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The ethical hacking process followed several steps, which employed a variety of pentesting techniques: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Definition of types of evidence<\/strong>Ethical hacking can be done with a lot or little information, depending on the objectives. In this case, it was decided on the types of tests in which the organisation under analysis provides access to the network where the resources are located, but not to the servers or applications. The different attacks to be carried out, such as network penetration or database access, were also defined.<\/li>\n\n\n\n<li><strong>Phases of implementation<\/strong>As with any process, pentesting is done in phases. It started with a scan in order to find the access point, after which the access was kept undetected in order to get all the necessary information. Finally, a fingerprint wipe was performed, which is essential to avoid being discovered later on.<\/li>\n\n\n\n<li><strong>Report writing<\/strong>Ethical hacking concluded with the production of a report containing all the findings, as well as recommendations to be followed in order to solve the problems and protect the assets against real attacks.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Results <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">This ethical hacking process revealed numerous vulnerabilities in the virtual machine, such as compromised ports and injected code, through non-intrusive scanning so that traffic was not blocked and raised no alarms. All vulnerabilities found were compiled in a report in order to have a complete overview and facilitate the resolution of all issues, thus preventing different types of attacks and problems.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"659\" src=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image50-1024x659.png\" alt=\"\" class=\"wp-image-17655\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image50-1024x659.png 1024w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image50-256x165.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image50-512x330.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image50-768x494.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image50-18x12.png 18w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/image50.png 1058w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusions<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Ethical hacking has become an essential process for any organisation, as it is a proactive way to stay ahead of cybercriminals and keep all assets safe. It also provides security recommendations, both for devices and the people who interact with them.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Ethical hacking has become an essential tool in cyber security. The way it mimics the attacks of cybercriminals provides a clear view of vulnerabilities, so that they can be corrected and protected.<\/p>","protected":false},"featured_media":17697,"menu_order":0,"template":"","area":[245],"class_list":["post-17635","proyectos","type-proyectos","status-publish","has-post-thumbnail","hentry","area-cyber"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos\/17635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/proyectos"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos\/17635\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/17697"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=17635"}],"wp:term":[{"taxonomy":"area","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/area?post=17635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}