<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://miguelangel.torresegea.es/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://miguelangel.torresegea.es/wiki/feed.php">
        <title>miguel angel torres egea</title>
        <description></description>
        <link>https://miguelangel.torresegea.es/wiki/</link>
        <image rdf:resource="https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png" />
       <dc:date>2026-05-23T20:24:55+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:lab18?rev=1740138780&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:lab19?rev=1740138058&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:lab20?rev=1740141555&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:sincara?rev=1740564007&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png">
        <title>miguel angel torres egea</title>
        <link>https://miguelangel.torresegea.es/wiki/</link>
        <url>https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png</url>
    </image>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:lab18?rev=1740138780&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-02-21T11:53:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Lab Module 18 IoT and OT Hacking</title>
        <link>https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:lab18?rev=1740138780&amp;do=diff</link>
        <description>Lab Module 18 IoT and OT Hacking

Lab 1: Perform Footprinting using Various Footprinting Techniques

Task 1: Gather Information using Online Footprinting Tools

	*  Launch any web browser, go to &lt;https://www.whois.com/whois&gt; (here, we are using Mozilla Firefox).
	*  The Whois Domain Lookup page appears; type</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:lab19?rev=1740138058&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-02-21T11:40:58+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Lab Module 19 Cloud Computing</title>
        <link>https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:lab19?rev=1740138058&amp;do=diff</link>
        <description>Lab Module 19 Cloud Computing

Lab 1: Perform Reconnaissance on Azure

As an ethical hacker, you need to know how to utilize PowerShell command-based scripting tools for conducting reconnaissance and gathering information. This information can then be used to assess the security posture of other systems within the network.</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:lab20?rev=1740141555&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-02-21T12:39:15+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Lab Module 20 Cryptography</title>
        <link>https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:lab20?rev=1740141555&amp;do=diff</link>
        <description>Lab Module 20 Cryptography

With the increasing adoption of the Internet for business and personal communication, securing sensitive information such as credit-card and personal identification numbers (PINs), bank account numbers, and private messages is becoming increasingly important, and yet, more difficult to achieve. Today’s information-based organizations extensively use the Internet for e-commerce, market research, customer support, and a variety of other activities. Thus, data security i…</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:sincara?rev=1740564007&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-02-26T10:00:07+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Apuntes SinCara sesión 5</title>
        <link>https://miguelangel.torresegea.es/wiki/info:cursos:pue:ethical-hacker:sesion5:sincara?rev=1740564007&amp;do=diff</link>
        <description>Apuntes SinCara sesión 5

Modulo 18 - IoT Hacking

	*  &lt;https://zumpad.zum.de/p/SinCara-ICS&gt; - ICS
	*  &lt;https://wiki.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Top_10&gt; - OWASP Top 10 IoT 2024
	*  &lt;https://www.fcc.gov/oet/ea/fccid&gt; - FCC ID
	*  &lt;https://www.redeszone.net/noticias/redes/web-of-things-wot-que-es-funcionamiento/&gt; - Web of Things (WoT): una capa que unifica y simplifica la comunicación entre dispositivos, usando tecnologías web como HTTP, REST y JSON.</description>
    </item>
</rdf:RDF>
