Dashboard » Samuel Esteban » Mis artículos
Samuel Esteban
@saamux
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T072639Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=f7708dfa346d6524f8ae3161e3019ee792279552c41395e80cfaf34212fa1bdc)
Samuel Esteban
@saamux
Senior Pentester Blogger
Escribe artículos para la comunidad
Técnicas para Bypassear un Uploader y subir una Web Shell
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T072640Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=29e06af9793ad98c0d1760515f84e802644b06cad430696d56acce75cdb10bec)
Cuando se realiza un Pentesting Web, lo más importante es detecta..
Evadiendo Antivirus con Shellter
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T072640Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=29e06af9793ad98c0d1760515f84e802644b06cad430696d56acce75cdb10bec)
Cuando se realiza un Pentesting a nivel de sistema operativo, lo ..
Inyección XPath en Aplicaciones Web.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T072640Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=29e06af9793ad98c0d1760515f84e802644b06cad430696d56acce75cdb10bec)
Las inyecciones son un tipo de ataque muy peligroso para aplicati..
Explotación de vulnerabilidades de código en Joomla(CMS)
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T072640Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=29e06af9793ad98c0d1760515f84e802644b06cad430696d56acce75cdb10bec)
Joomla es uno de los gestores de contenidos más utilizados en el ..
Detectando Web Shells en Nuestro Servidor Web
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T072640Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=29e06af9793ad98c0d1760515f84e802644b06cad430696d56acce75cdb10bec)
Gran cantidad de desarrolladores webs me ha preguntado constantem..
Inyección de código malicioso en aplicaciones Web(PHP)
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T072641Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=b864b5999665c1e492cabd9fcc6e33acc43d87520052c83e71c8954aa295d9a2)
Owasp posee un TOP 10 de vulnerabilidades orientadas a aplicacion..