Dashboard » Cristian Palma P » Mis artículos
Cristian Palma P
@__script1an__
Cristian Palma P
Cristian Palma P
Cristian Palma P
Cristian Palma P
Cristian Palma P
Cristian Palma P
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T054412Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=8245044cffd5e84195fb1c85fb786acd752614b3977c065542bcf3f2f2811efd)
Cristian Palma P
@__script1an__
Blogger
Escribe artículos para la comunidad
Creando un dispositivo para análisis de malware en android
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T054412Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=e80e9279b178dcf2783f9a5ddfb4fdc486b953d3e3947c7adda1cee43bddfaaf)
En el siguiente apartado se presentará una breve explicación de c..
Bypass a SSL Pinning en Android
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T054413Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=f9b7424e849f9217f394d8b8342bbc96f4513375edabee23a352ab78121f7e96)
Http Public Key Pinning “HPKP” es una función de seguridad que le..
Elevando privilegios y extrayendo credenciales con Empire y Powershell
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T054413Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=f9b7424e849f9217f394d8b8342bbc96f4513375edabee23a352ab78121f7e96)
En apartados anteriores hemos realizado la forma de cómo comprome..
Comprometiendo Windows con PowerShell Empire
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T054413Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=f9b7424e849f9217f394d8b8342bbc96f4513375edabee23a352ab78121f7e96)
Empire es una herramienta de post-explotación de PowerShell const..
Elevando Privilegios (UAC) con metasploit
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T054413Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=f9b7424e849f9217f394d8b8342bbc96f4513375edabee23a352ab78121f7e96)
Como hemos visto con anterioridad en BacktrackAcademy, se no ha p..
Explorando la vulnerabilidad XXE - XML External Entity
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T054413Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=f9b7424e849f9217f394d8b8342bbc96f4513375edabee23a352ab78121f7e96)
Una vulnerabilidad de XXE consiste en una inyección que se aprove..