Dashboard » Samuel Esteban » Mis artículos
Samuel Esteban
@saamux
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
Samuel Esteban
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093717Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=a1ed156f4557780a462f2b88111d21171737fb2ff760ad762e0cc707ed7706db)
Samuel Esteban
@saamux
Senior Pentester Blogger
Escribe artículos para la comunidad
Aircrack-ng: La potente Suite para Auditorías Wifi.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093717Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5e5b0bdb6ea72016252efdaba0f7762d8d5671d1664d6744e3100fef4c92d506)
Aircrack-ng es una suite muy completa para las auditorías Wifi, e..
Hydra: Ataques de Fuerza Bruta Online
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093717Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5e5b0bdb6ea72016252efdaba0f7762d8d5671d1664d6744e3100fef4c92d506)
Hydra es una poderosa herramienta la cual permite realizar ataque..
John The Ripper: Crackeando Contraseñas Offline
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093717Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5e5b0bdb6ea72016252efdaba0f7762d8d5671d1664d6744e3100fef4c92d506)
Siguiendo con el top 10 de herramientas de Kali Linux, en esta op..
Sqlmap Parte II: Obteniendo acceso de administrador de base de datos.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093717Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5e5b0bdb6ea72016252efdaba0f7762d8d5671d1664d6744e3100fef4c92d506)
En esta segunda etapa veremos cómo obtener acceso de administrado..
Sqlmap Parte I: Automatizando Inyección SQL
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093717Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5e5b0bdb6ea72016252efdaba0f7762d8d5671d1664d6744e3100fef4c92d506)
Sqlmap es una poderosa herramienta la cual permite automatizar la..
¿Cómo realizar un Pentesting sigiloso con Nmap?
![](https://bta-plataform-prod.s3.amazonaws.com/variants/hAuyoztwAzUaHjGKokAyMFLt/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22perfil.png%22%3B%20filename%2A%3DUTF-8%27%27perfil.png&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T093718Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=740975132b8de10e73fd13788372d35a5c5c8ad55d86590b8d662746ccfbd908)
Para realizar un Pentesting es importante dejar la menor cantidad..