UNIVERSIDAD NACIONAL EXPERIMENTAL
"SIMÓN RODRÍGUEZ"
NÚCLEO PALO VERDE

CONTENIDO PROGRAMÁTICO

TEMA 1: GENERALIDADES.

1. DEFINICIÓN DE FINANZAS.
2. CONCEPTO DE FINANZAS INTERNACIONALES.
3. IMPORTANCIA DE LAS FINANZAS INTERNACIONALES.
4. NOMENCLATURA USADAS EN LAS FINANZAS INTERNACIONALES.
5. VALOR DE CAMBIO CON RESPECTO AL DÓLAR Y AL EURO.
6. TIPOS DE OPERACIONES INTERNACIONALES.
7. VENTAJAS Y DESVENTAJAS.

TEMA 2: BALANZA DE PAGOS.

1. CONCEPTO, CARACTERÍSTICAS, TIPOS DE CUENTAS.
2. REGISTRO DE LAS OPERACIONES CONTABLES.
3. PROBLEMAS EN EL REGISTRO DE LAS OPERACIONES EN LA BALANZA DE PAGOS.
4. ANÁLISIS DE LOS EFECTOS DE LA BALANZA DE PAGOS.
5. DESCRIPCIÓN DE LA BALANZA DE PAGOS EN VENEZUELA DESDE EL AÑO 2005 HASTA EL PRESENTE.

TEMA 3: SISTEMA MONETARIO INTERNACIONAL.

1. CONCEPTO DEL SISTEMA MONETARIO INTERNACIONAL.
2. SISTEMA PATRÓN ORO: DEFINICIÓN Y FUNCIONAMIENTO.
3. SISTEMA BRETÓN WOODS: CONCEPTO Y CARACTERÍSTICAS, COMPORTAMIENTO DESDE 1944 HASTA EL PRESENTE.
4. INSTITUCIONES FINANCIERAS INTERNACIONALES: FONDO MONETARIO INTERNACIONAL: SU CREACIÓN, FUNCIONES, TIPOS DE SERVICIO QUE PRESTA, ROL DE ESTOS ORGANISMOS A NIVEL GLOBAL EN LOS ÚLTIMOS AÑOS.
5. BANCO MUNDIAL: CREACIÓN, FUNCIONES, TIPOS DE SERVICIO QUE PRESTA Y ROL DE ESTE ORGANISMO MUNDIAL EN LOS ÚLTIMOS TIEMPOS HASTA EL PRESENTE.
6. BANCO INTERNACIONAL DE PAGO (COMPENSACIÓN): ACUERDO DE BASILEA: SU CREACIÓN, FUNCIONES Y TIPOS DE SERVICIO QUE PRESTA.
7. SISTEMA MONETARIO EUROPEO: CREACIÓN, ESTRUCTURA, FUNCIONES Y TIPOS DE SERVICIO QUE PRESTA.
8. LA MONEDA EURO: COTIZACIÓN, ESTRUCTURA (CANASTA DE VARIAS MONEDAS).
9. DERECHO ESPECIAL DE GIRO: CONCEPTO, FUNCIONES Y ESTRUCTURA.

TEMA 4: MERCADO CAMBIARIO.

1. CONCEPTO DE DIVISA.
2. MERCADO DE DIVISAS.
3. OPERACIONES DE CAMBIO EN EL MERCADO INTERNACIONAL.
4. TIPOS DE COTIZACIONES DE CAMBIO.
5. CONTRATOS A FUTURO (FORWARD): CONCEPTO, FUNCIONES Y TIPOS DE CONTRATOS.
6. SISTEMA CAMBIARIO DE BANDAS: DEFINICIÓN Y FUNCIONAMIENTO.
7. RIESGO CAMBIARIO: CONCEPTO, ELEMENTOS FUNDAMENTALES DEL RIESGO CAMBIARIO: POSICIÓN CORTA Y POSICIÓN LARGA, TIPOS DE RIESGOS DE CAMBIO: TRANSACCIÓN DE BALANCE Y ECONÓMICO, ENDEUDAMIENTO EMPRESARIAL EN MONEDA EXTRANJERA.
8. COMPORTAMIENTO DEL MERCADO CAMBIARIO EN VENEZUELA DESDE 2005 HASTA EL PRESENTE.

TEMA 5: MERCADO FINANCIERO INTERNACIONAL.

1. CONCEPTO Y FINALIDAD.
2. ESTRUCTURA DEL MERCADO FINANCIERO INTERNACIONAL.
3. TIPOS Y FUNCIONAMIENTO DE LOS CRÉDITOS INTERNACIONALES. (TRAER MODELO).
4. MERCADO DE EURODÓLARES: TIPOS Y FUNCIONAMIENTO (TRAER MODELO).
5. MERCADO INTERNACIONAL DE BONOS: CLASIFICACIÓN DEL MERCADO DE BONOS, ESTRUCTURA Y FUNCIONAMIENTO.
6. MERCADO DE EUROCRÉDITOS: ESTRUCTURA Y FUNCIONAMIENTO.

TEMA 6: FINANCIAMIENTO DEL COMERCIO INTERNACIONAL.

1. CONCEPTO Y FINALIDAD.
2. CARTA DE CRÉDITO: DEFINICIÓN, TIPOS, MODALIDADES, VENTAJAS Y DESVENTAJAS (TRAER MODELO).
3. COBRO DOCUMENTARIO: CONCEPTO Y TIPOS (TRAER MODELO).
4. ACEPTACIÓN BANCARIA: CONCEPTO Y TIPOS. (TRAER MODELO).
5. FACTORIZACIÓN: DEFINICIÓN Y TIPOS (TRAER MODELO).
6. FORFETIZACIÓN: CONCEPTO Y TIPOS (TRAER MODELO).
7. ARRENDAMIENTO INTERNACIONAL: CONCEPTO Y TIPOS (TRAER MODELO).
8. PERMUTA INTERNACIONAL: CONCEPTO Y TIPOS (TRAER MODELO).

TEMA 7: MERCADO BURSÁTIL INTERNACIONAL.

1. MERCADO WALL STREET (NEW YORK): FUNCIONAMIENTO Y TIPOS DE OPERACIONES.
2. MERCADO DEL ORO: FUNCIONAMIENTO Y TIPOS DE OPERACIONES.
3. DEUDA EXTERNA MUNDIAL: MERCADO DE LA DEUDA EXTERNA LATINOAMERICANA, TIPOS DE TÍTULOS QUE SE COTIZAN Y OPERACIONES; PLAN BRADY: CONCEPTO, VENTAJA Y DESVENTAJAS.
4. DEUDA EXTERNA VENEZOLANA: COMPORTAMIENTO DESDE 1983 HASTA NUESTROS DÍAS.
5. CLUB DE PARÍS: FUNCIONAMIENTO, VENTAJAS Y DESVENTAJAS.
6. MERCADO DE TÍTULOS ADR Y GDR: CONCEPTO Y FUNCIONAMIENTO DE ESTOS TÍTULOS.

TEMA 8: INVERSIÓN EXTERNA DIRECTA.

1. CONCEPTO.
2. EFECTOS DE LA INVERSIÓN EXTERNA DIRECTA EN LA BALANZA DE PAGOS EN EL PAÍS RECEPTOR Y DEL PAÍS INVERSOR.
3. LA EMPRESA MULTINACIONAL: DEFINICIÓN, CARACTERÍSTICAS, VENTAJA Y DESVENTAJAS DE SU INSTALACIÓN EN EL PAÍS.
4. FINANCIAMIENTO DE CASA MATRIZ A FILIAL Y VICEVERSA.
5. ASOCIACIONES ESTRATÉGICAS: CONCEPTO Y FUNCIONAMIENTO EN VENEZUELA (TRAER 02 MODELOS DE CASOS EN NUESTRO PAÍS).
6. COMPORTAMIENTO DE LA INVERSIÓN EXTRANJERA DIRECTA EN VENEZUELA DESDE 2005 HASTA NUESTROS DÍAS.

sábado, 22 de agosto de 2020

Pagodo - Automate Google Hacking Database Scraping And Searching


The goal of this project was to develop a passive Google dork script to collect potentially vulnerable web pages and applications on the Internet. There are 2 parts. The first is ghdb_scraper.py that retrieves Google Dorks and the second portion is pagodo.py that leverages the information gathered by ghdb_scraper.py.

What are Google Dorks?
The awesome folks at Offensive Security maintain the Google Hacking Database (GHDB) found here: https://www.exploit-db.com/google-hacking-database. It is a collection of Google searches, called dorks, that can be used to find potentially vulnerable boxes or other juicy info that is picked up by Google's search bots.

Installation
Scripts are written for Python 3.6+. Clone the git repository and install the requirements.
git clone https://github.com/opsdisk/pagodo.git
cd pagodo
virtualenv -p python3 .venv # If using a virtual environment.
source .venv/bin/activate # If using a virtual environment.
pip install -r requirements.txt

Google is blocking me!
If you start getting HTTP 503 errors, Google has rightfully detected you as a bot and will block your IP for a set period of time. The solution is to use proxychains and a bank of proxies to round robin the lookups.
Install proxychains4
apt install proxychains4 -y
Edit the /etc/proxychains4.conf configuration file to round robin the look ups through different proxy servers. In the example below, 2 different dynamic socks proxies have been set up with different local listening ports (9050 and 9051). Don't know how to utilize SSH and dynamic socks proxies? Do yourself a favor and pick up a copy of The Cyber Plumber's Handbook to learn all about Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
vim /etc/proxychains4.conf
round_robin
chain_len = 1
proxy_dns
remote_dns_subnet 224
tcp_read_time_out 15000
tcp_connect_time_out 8000
[ProxyList]
socks4 127.0.0.1 9050
socks4 127.0.0.1 9051
Throw proxychains4 in front of the Python script and each lookup will go through a different proxy (and thus source from a different IP). You could even tune down the -e delay time because you will be leveraging different proxy boxes.
proxychains4 python3 pagodo.py -g ALL_dorks.txt -s -e 17.0 -l 700 -j 1.1

ghdb_scraper.py
To start off, pagodo.py needs a list of all the current Google dorks. A datetimestamped file with the Google dorks and the indididual dork category dorks are also provided in the repo. Fortunately, the entire database can be pulled back with 1 GET request using ghdb_scraper.py. You can dump all dorks to a file, the individual dork categories to separate dork files, or the entire json blob if you want more contextual data about the dork.
To retrieve all dorks
python3 ghdb_scraper.py -j -s
To retrieve all dorks and write them to individual categories:
python3 ghdb_scraper.py -i
Dork categories:
categories = {      1: "Footholds",      2: "File Containing Usernames",      3: "Sensitives Directories",      4: "Web Server Detection",      5: "Vulnerable Files",      6: "Vulnerable Servers",      7: "Error Messages",      8: "File Containing Juicy Info",      9: "File Containing Passwords",      10: "Sensitive Online Shopping Info",      11: "Network or Vulnerability Data",      12: "Pages Containing Login Portals",      13: "Various Online devices",      14: "Advisories and Vulnerabilities",  }  

pagodo.py
Now that a file with the most recent Google dorks exists, it can be fed into pagodo.py using the -g switch to start collecting potentially vulnerable public applications. pagodo.py leverages the google python library to search Google for sites with the Google dork, such as:
intitle:"ListMail Login" admin -demo  
The -d switch can be used to specify a domain and functions as the Google search operator:
site:example.com  
Performing ~4600 search requests to Google as fast as possible will simply not work. Google will rightfully detect it as a bot and block your IP for a set period of time. In order to make the search queries appear more human, a couple of enhancements have been made. A pull request was made and accepted by the maintainer of the Python google module to allow for User-Agent randomization in the Google search queries. This feature is available in 1.9.3 and allows you to randomize the different user agents used for each search. This emulates the different browsers used in a large corporate environment.
The second enhancement focuses on randomizing the time between search queries. A minimum delay is specified using the -e option and a jitter factor is used to add time on to the minimum delay number. A list of 50 jitter times is created and one is randomly appended to the minimum delay time for each Google dork search.
categories = {
1: "Footholds",
2: "File Containing Usernames",
3: "Sensitives Directories",
4: "Web Server Detection",
5: "Vulnerable Files",
6: "Vulnerable Servers",
7: "Error Messages",
8: "File Containing Juicy Info",
9: "File Containing Passwords",
10: "Sensitive Online Shopping Info",
11: "Network or Vulnerability Data",
12: "Pages Containing Login Portals",
13: "Various Online devices",
14: "Advisories and Vulnerabilities",
}
Latter in the script, a random time is selected from the jitter array and added to the delay.
intitle:"ListMail Login" admin -demo
Experiment with the values, but the defaults successfully worked without Google blocking my IP. Note that it could take a few days (3 on average) to run so be sure you have the time.
To run it:
site:example.com

Conclusion
Comments, suggestions, and improvements are always welcome. Be sure to follow @opsdisk on Twitter for the latest updates.




via KitPloitRelated word
  1. Pentest Tools Open Source
  2. Github Hacking Tools
  3. Hacker Tools Apk Download
  4. Hacking Tools Kit
  5. Hacker
  6. Hack Tools For Games
  7. Hacker Tools Mac
  8. Hacker Tools For Ios
  9. Hacker Tools 2019
  10. Hacker Tools For Ios
  11. New Hacker Tools
  12. Pentest Tools Android
  13. Hacking Tools Windows 10
  14. Hacker Tools Windows
  15. Termux Hacking Tools 2019
  16. Hacking App
  17. World No 1 Hacker Software
  18. Hack Tools Pc
  19. Hacking Tools For Kali Linux
  20. Hacker Tools For Pc
  21. New Hacker Tools
  22. Hacks And Tools
  23. Hack Tools For Ubuntu
  24. Hacker Tool Kit
  25. Computer Hacker
  26. Hacker Tools Linux
  27. Hacker Tools Software
  28. Hack Tools For Windows
  29. Tools Used For Hacking
  30. Pentest Tools For Android
  31. Hack Tool Apk No Root
  32. Pentest Tools Linux
  33. Nsa Hacker Tools
  34. Hacker Tools 2019
  35. Hacker Tools Apk Download
  36. Physical Pentest Tools
  37. Hacker Hardware Tools
  38. Hacker Tools 2020
  39. Easy Hack Tools
  40. Kik Hack Tools
  41. Hack Tools Mac
  42. Pentest Recon Tools
  43. Black Hat Hacker Tools
  44. Tools Used For Hacking
  45. Hacking Tools For Windows
  46. Pentest Tools Android
  47. Hack And Tools
  48. Hack Tools For Pc
  49. What Is Hacking Tools
  50. Pentest Tools Alternative
  51. Hacker Tools Online
  52. Hacking Tools Mac
  53. How To Install Pentest Tools In Ubuntu
  54. Pentest Tools
  55. Pentest Tools Website
  56. Hacking Tools Online
  57. Pentest Tools Download
  58. Pentest Tools Port Scanner
  59. Hacker Tools
  60. Hacking App
  61. Blackhat Hacker Tools
  62. Hacking Tools For Kali Linux
  63. Best Pentesting Tools 2018
  64. Hackrf Tools
  65. Hacker Tools Hardware
  66. Pentest Tools Website
  67. Wifi Hacker Tools For Windows
  68. Install Pentest Tools Ubuntu
  69. Hacker Tools Free
  70. Pentest Tools Alternative
  71. Growth Hacker Tools
  72. Hacking Tools Mac
  73. Black Hat Hacker Tools
  74. Hacker Tools For Windows
  75. Pentest Tools Open Source
  76. Pentest Tools Alternative
  77. Hacking Apps
  78. Hacker Hardware Tools
  79. How To Make Hacking Tools
  80. Hacking Tools Software
  81. Hack Tools For Games
  82. Best Pentesting Tools 2018
  83. Free Pentest Tools For Windows
  84. Hacker Tools Hardware
  85. Tools For Hacker
  86. Hack Tools Pc
  87. Nsa Hack Tools Download
  88. Pentest Tools Windows
  89. Pentest Tools For Ubuntu
  90. Pentest Tools Kali Linux
  91. Hacking Tools For Windows
  92. Hacker Tools Windows
  93. Hacker Tools Apk Download
  94. Hack Tools For Mac
  95. Hacking Tools 2020
  96. Hacker Tools Mac
  97. Hacking Tools Kit
  98. Hack Tool Apk No Root
  99. Bluetooth Hacking Tools Kali
  100. Blackhat Hacker Tools
  101. Hacker Security Tools
  102. Pentest Tools Linux
  103. Hacker Tools Mac
  104. Game Hacking
  105. Hack Rom Tools
  106. Hack App
  107. Hacking Tools Pc
  108. Hacking Tools Windows
  109. Hack Tools Mac
  110. Pentest Tools Tcp Port Scanner
  111. Pentest Tools Download
  112. Hacking Tools Usb
  113. Pentest Tools Github
  114. Black Hat Hacker Tools
  115. Bluetooth Hacking Tools Kali
  116. Hacking Tools For Windows 7
  117. Growth Hacker Tools
  118. Hacker Tools For Windows
  119. Hacker Tools Free
  120. Beginner Hacker Tools
  121. Hacker Tools For Pc
  122. Pentest Tools Nmap
  123. Hacker Hardware Tools
  124. Pentest Tools For Android
  125. Hacking Tools Github
  126. Hacks And Tools
  127. Hack App
  128. Pentest Box Tools Download
  129. Hacker Tools 2020
  130. Nsa Hacker Tools
  131. Best Pentesting Tools 2018
  132. New Hack Tools
  133. Hacker Tools Github
  134. Hacker Tools Free Download
  135. Pentest Tools Online
  136. Pentest Tools Review
  137. Pentest Tools Subdomain
  138. Kik Hack Tools
  139. Pentest Tools Find Subdomains
  140. Black Hat Hacker Tools
  141. Pentest Tools Online
  142. Hacker Tools For Ios
  143. Hackrf Tools
  144. Easy Hack Tools
  145. Hacker Security Tools
  146. Hacker Techniques Tools And Incident Handling
  147. Hacker Tools Free Download
  148. Pentest Tools Apk
  149. Hack Tools For Games
  150. Hacker Tools Github
  151. What Is Hacking Tools
  152. Hack Tools 2019
  153. Hackrf Tools

No hay comentarios: