Dashboard » Samuel Esteban » Mis artículos
Samuel Esteban
@saamux
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093824Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=2ef7d2fde04920476d53e8e8ba4065f6b936bd1608a5c2436cadf9f2ba3c4b55)
Samuel Esteban
@saamux
Senior Pentester Blogger
Escribe artículos para la comunidad
Desarrollo de herramienta Brute Force para aplicaciones web con Python
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093824Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=627ba87e462eed54c3e6963f03fd004c26a83de796c5a06baf1ea15232307a87)
El día de hoy veremos en detalle el poder que tiene el lenguaje d..
Saltando HSTS con Man In The Middle Framework
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093824Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=627ba87e462eed54c3e6963f03fd004c26a83de796c5a06baf1ea15232307a87)
En esta oportunidad veremos algo muy interesante a través de un a..
Realizando Ingeniería Inversa a Ransomware.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093824Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=627ba87e462eed54c3e6963f03fd004c26a83de796c5a06baf1ea15232307a87)
Si alguna vez te ha pasado o has tenido algún conocido el cual ha..
XSS: Capturando Cookies de Sesión
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093825Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=8fc7db73c4504b3d5b58e7a7845b51a7ea3a6b5a7db6f74ff5c7d2772325e794)
Una de las vulnerabilidades más presentes a nivel mundial en los ..
Explotando la Vulnerabilidad LFI
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093825Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=8fc7db73c4504b3d5b58e7a7845b51a7ea3a6b5a7db6f74ff5c7d2772325e794)
A nivel web, existen distintas vulnerabilidades las cuales pueden..
Configurando una VPN en Kali Linux
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093825Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=8fc7db73c4504b3d5b58e7a7845b51a7ea3a6b5a7db6f74ff5c7d2772325e794)
Una VPN (Virtual Private Network) es una tecnología de red que se..