Dashboard » Cristian Palma P » Mis artículos
Cristian Palma P
@__script1an__
Cristian Palma P
Cristian Palma P
Cristian Palma P
Cristian Palma P
Cristian Palma P
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T073607Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=cc1a73d68ee1feff0dfeaf96d7d5c345282cb7646d9457bf228f94b2e9222cd3)
Cristian Palma P
@__script1an__
Blogger
Escribe artículos para la comunidad
Explotando Vulnerabilidades con Metasploit Web en Windows
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T073608Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=e884ad7b4fd65fe363d8d8ef622743113ac2d1933ff7dc6003905379294547f2)
Dentro de las características avanzadas que nos ofrece la interfa..
Instalando Metasploit en Windows
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T073608Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=e884ad7b4fd65fe363d8d8ef622743113ac2d1933ff7dc6003905379294547f2)
Metasploit es una de la más popular y conocida herramienta de Pen..
Explotando la vulnerabilidad LDF (Local File Disclosure)
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T073608Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=e884ad7b4fd65fe363d8d8ef622743113ac2d1933ff7dc6003905379294547f2)
Con anterioridad en BacktrackAcademy nos enfocamos generar una id..
Instalando Metasploit WUI en Windows
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T073608Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=e884ad7b4fd65fe363d8d8ef622743113ac2d1933ff7dc6003905379294547f2)
Metasploit es una de la más popular y conocida herramienta de Pen..
Recolección de información con [MSF] Metasploit Framework
![](https://bta-plataform-prod.s3.amazonaws.com/variants/PqpEDfudB9kp12BkuS92dJ9n/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22LOGO-URI-SPIONI-MH-1.png%22%3B%20filename%2A%3DUTF-8%27%27LOGO-URI-SPIONI-MH-1.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T073609Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=cc23d900104acf44c8221ab42b0c1a002a2eef03246faea373032c0e9b0046ee)
La Recolección de información es la base para cualquier prueba de..