<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://miguelangel.torresegea.es/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://miguelangel.torresegea.es/wiki/feed.php">
        <title>miguel angel torres egea</title>
        <description></description>
        <link>https://miguelangel.torresegea.es/wiki/</link>
        <image rdf:resource="https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png" />
       <dc:date>2026-05-23T16:08:56+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion4:sincara?rev=1740563507&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion4:lab13?rev=1740125096&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png">
        <title>miguel angel torres egea</title>
        <link>https://miguelangel.torresegea.es/wiki/</link>
        <url>https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png</url>
    </image>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion4:sincara?rev=1740563507&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-02-26T09:51:47+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Apuntes SinCara sesión 4</title>
        <link>https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion4:sincara?rev=1740563507&amp;do=diff</link>
        <description>Apuntes SinCara sesión 4

Modulo 14 : Hacking Web Applications

	*  OWASP
		*  OWASP Top 10
			*  &lt;https://owasp.org/Top10/es&gt; - OWASP Top 10 2021
			*  &lt;https://www.incibe.es/empresas/blog/top-10-vulnerabilidades-web-2021&gt; - Resumen

		*  OWASP Web Security Testing Guide (WSTG)
			*  &lt;https://thehackerway.com/2021/03/22/conoce-el-owasp-web-security-testing-guide-wstg/&gt; - WSTG
			*  &lt;https://owasp.org/www-project-web-security-testing-guide/&gt; - guía de 465 páginas.
				*  &lt;https://github.com/OWAS…</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion4:lab13?rev=1740125096&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-02-21T08:04:56+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Lab Module 13</title>
        <link>https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion4:lab13?rev=1740125096&amp;do=diff</link>
        <description>Lab Module 13

Lab 1: Footprint the Web Server

Task 1: Footprint a Web Server using Netcat and Telnet

Task 2: Enumerate Web Server Information using Nmap Scripting Engine (NSE)

Lab 2: Perform a Web Server Attack

Task 1: Crack FTP Credentials using a Dictionary Attack</description>
    </item>
</rdf:RDF>
