Dashboard » Samuel Esteban » Mis artículos
Samuel Esteban
@saamux
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T113627Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=545eaa75fcbe6d8c713d2d11c30f308254d48121908ded5832e7b7f5b0e3445b)
Samuel Esteban
@saamux
Senior Pentester Blogger
Escribe artículos para la comunidad
Técnicas para Bypassear un Uploader y subir una Web Shell
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T113627Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=6f897335966f1bc5dcf8015c30aab277cbf8df625cd5a5b5182fb978ae5279bf)
Cuando se realiza un Pentesting Web, lo más importante es detecta..
Evadiendo Antivirus con Shellter
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T113628Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=2bbcc7aac66c80db809d63cf9a1b728cbac1609ff8f4dda138558fbe85380610)
Cuando se realiza un Pentesting a nivel de sistema operativo, lo ..
Inyección XPath en Aplicaciones Web.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T113628Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=2bbcc7aac66c80db809d63cf9a1b728cbac1609ff8f4dda138558fbe85380610)
Las inyecciones son un tipo de ataque muy peligroso para aplicati..
Explotación de vulnerabilidades de código en Joomla(CMS)
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T113628Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=2bbcc7aac66c80db809d63cf9a1b728cbac1609ff8f4dda138558fbe85380610)
Joomla es uno de los gestores de contenidos más utilizados en el ..
Detectando Web Shells en Nuestro Servidor Web
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T113628Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=2bbcc7aac66c80db809d63cf9a1b728cbac1609ff8f4dda138558fbe85380610)
Gran cantidad de desarrolladores webs me ha preguntado constantem..
Inyección de código malicioso en aplicaciones Web(PHP)
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T113628Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=2bbcc7aac66c80db809d63cf9a1b728cbac1609ff8f4dda138558fbe85380610)
Owasp posee un TOP 10 de vulnerabilidades orientadas a aplicacion..