{"id":2312,"date":"2012-05-21T22:59:06","date_gmt":"2012-05-22T03:29:06","guid":{"rendered":"https:\/\/skatox.com\/blog\/?p=2312"},"modified":"2012-05-21T22:59:06","modified_gmt":"2012-05-22T03:29:06","slug":"ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick","status":"publish","type":"post","link":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/","title":{"rendered":"Ghost in the Wires: Las historias de hacking de Kevin Mitnick"},"content":{"rendered":"<p>Si has estado en el mundo de la seguridad inform\u00e1tica seguro conoces a <a title=\"Biograf\u00eda de Mitnick\" href=\"https:\/\/es.wikipedia.org\/wiki\/Kevin_Mitnick\" target=\"_blank\">Kevin Mitnick<\/a>, si no, te recomiendo leer sobre el hacker mas famoso de todos los tiempos por ser el primero en aparecer en la lista de los 10 mas buscados del FBI.<\/p>\n<p>Su libro \u00abGhost in the Wires\u00bb narra, toda sus actividades de hacking desde los inicios hasta que se cambi\u00f3 al bando de la seguridad inform\u00e1tica. Lo interesante de esta historia, es el hacking en la era pre-internet (como la conocemos) pues narra y explica sus hacks (o phreaks) a las l\u00edneas telef\u00f3nicas, como logr\u00f3 tomar poder se de switches, hacer llamadas a donde quisiera, clonar l\u00edneas telef\u00f3nicas, entre otros. Para la gente de nuestra generaci\u00f3n que conoce el hacking s\u00f3lo a trav\u00e9s de Internet, les gustar\u00e1 conocer el pasado de como se hac\u00eda todo esto a trav\u00e9s de las l\u00edneas telef\u00f3nicas.<\/p>\n<figure id=\"attachment_2313\" aria-describedby=\"caption-attachment-2313\" style=\"width: 340px\" class=\"wp-caption aligncenter\"><a  href=\"https:\/\/skatox.com\/blog\/images\/2012\/05\/ghost.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"Ghost in the wires\" data-rl_caption=\"Portada del libro\"><img decoding=\"async\" class=\"size-full wp-image-2313\" title=\"Ghost in the wires\" src=\"https:\/\/skatox.com\/blog\/images\/2012\/05\/ghost.png\" alt=\"Ghost in the wires\" width=\"340\" height=\"510\" \/><\/a><figcaption id=\"caption-attachment-2313\" class=\"wp-caption-text\">Portada del libro<\/figcaption><\/figure>\n<p>La narraci\u00f3n me parece normal, el libro se pone interesante dependiendo del tema que se esta leyendo, hay partes aburridas pero otras buenas, podemos decir que tiene sus altos y altibajos. Para los amantes de la ingenier\u00eda social, les gustar\u00e1 ver como Mitnick lograba enga\u00f1ar a las personas y tener control sobre ellas para pedir cualquier tipo de informaci\u00f3n interna, logrando ahorrarse gran parte de encontrar vulnerabilidades en los servidores, para los phreakers encontrar\u00e1n mucha informaci\u00f3n sobre como se hac\u00edan los ataques a las l\u00edneas telef\u00f3nicas y para los hackers pues como estudiaba la infraestructura de la empresa para encontrar una vulnerabilidad y aprovecharla.<\/p>\n<p>Al final de leer el libro, aprender\u00e1n como en la vida se tiene altos y bajos, como \u00e9l para llegar a la fama y reputaci\u00f3n actual pas\u00f3 por muchas situaciones dif\u00edciles y el castigo que se aplica a los crackers. Tambi\u00e9n una vez conocida la historia, al ver la pel\u00edcula \u00abOperation Takedown\u00bb de nuevo, se dar\u00e1n cuenta que no se acerca a la vida real todo es una historia paralela creada por\u00a0 Tsutomu Shimomura.<\/p>\n<p>Realmente les recomiendo leer este libro si son fan\u00e1ticos de Kevin Mitnick, del hacking y de la ingenier\u00eda social. La versi\u00f3n f\u00edsica incluye unas fotos de Kevin, Lewis y Eric. De resto no le veo ninguna diferencia con respecto a la versi\u00f3n digital.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Si has estado en el mundo de la seguridad inform\u00e1tica seguro conoces a Kevin Mitnick, si no, te recomiendo leer sobre el hacker mas famoso&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/\">Seguir leyendo<span class=\"screen-reader-text\">Ghost in the Wires: Las historias de hacking de Kevin Mitnick<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[193,817,582],"tags":[818,107,947,833,834,836,835],"class_list":["post-2312","post","type-post","status-publish","format-standard","hentry","category-hacking-seguridad-informatica","category-libros","category-planetas-linux","tag-biografia","tag-hacker","tag-hacking-seguridad-informatica","tag-kevin-mitnick","tag-libro","tag-phreacker","tag-telefonos","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ghost in the Wires: Las historias de hacking de Kevin Mitnick - El blog de Skatox<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ghost in the Wires: Las historias de hacking de Kevin Mitnick - El blog de Skatox\" \/>\n<meta property=\"og:description\" content=\"Si has estado en el mundo de la seguridad inform\u00e1tica seguro conoces a Kevin Mitnick, si no, te recomiendo leer sobre el hacker mas famoso&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/\" \/>\n<meta property=\"og:site_name\" content=\"El blog de Skatox\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-22T03:29:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skatox.com\/blog\/images\/2012\/05\/ghost.png\" \/>\n<meta name=\"author\" content=\"Miguel Useche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skatox\" \/>\n<meta name=\"twitter:site\" content=\"@skatox\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miguel Useche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/\"},\"author\":{\"name\":\"Miguel Useche\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\"},\"headline\":\"Ghost in the Wires: Las historias de hacking de Kevin Mitnick\",\"datePublished\":\"2012-05-22T03:29:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/\"},\"wordCount\":422,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2012\\\/05\\\/ghost.png\",\"keywords\":[\"biografia\",\"hacker\",\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"kevin mitnick\",\"libro\",\"phreacker\",\"telefonos\"],\"articleSection\":[\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"Libros\",\"Planetas\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/\",\"name\":\"Ghost in the Wires: Las historias de hacking de Kevin Mitnick - El blog de Skatox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2012\\\/05\\\/ghost.png\",\"datePublished\":\"2012-05-22T03:29:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/#primaryimage\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2012\\\/05\\\/ghost.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2012\\\/05\\\/ghost.png\",\"width\":340,\"height\":510,\"caption\":\"Portada del libro\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2012\\\/05\\\/21\\\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ghost in the Wires: Las historias de hacking de Kevin Mitnick\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"name\":\"El blog de Skatox\",\"description\":\"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres\",\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skatox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\",\"name\":\"El blog de Skatox\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"width\":218,\"height\":218,\"caption\":\"El blog de Skatox\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ElWeblogdeSkatox\\\/\",\"https:\\\/\\\/x.com\\\/skatox\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/skatox\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MiguelAngelUsecheCastro\",\"https:\\\/\\\/x.com\\\/skatox\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\",\"name\":\"Miguel Useche\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187\",\"caption\":\"Miguel Useche\"},\"sameAs\":[\"https:\\\/\\\/skatox.com\",\"https:\\\/\\\/x.com\\\/skatox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ghost in the Wires: Las historias de hacking de Kevin Mitnick - El blog de Skatox","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/","og_locale":"es_ES","og_type":"article","og_title":"Ghost in the Wires: Las historias de hacking de Kevin Mitnick - El blog de Skatox","og_description":"Si has estado en el mundo de la seguridad inform\u00e1tica seguro conoces a Kevin Mitnick, si no, te recomiendo leer sobre el hacker mas famoso&#8230;","og_url":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/","og_site_name":"El blog de Skatox","article_publisher":"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","article_published_time":"2012-05-22T03:29:06+00:00","og_image":[{"url":"https:\/\/skatox.com\/blog\/images\/2012\/05\/ghost.png","type":"","width":"","height":""}],"author":"Miguel Useche","twitter_card":"summary_large_image","twitter_creator":"@skatox","twitter_site":"@skatox","twitter_misc":{"Escrito por":"Miguel Useche","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/#article","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/"},"author":{"name":"Miguel Useche","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba"},"headline":"Ghost in the Wires: Las historias de hacking de Kevin Mitnick","datePublished":"2012-05-22T03:29:06+00:00","mainEntityOfPage":{"@id":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/"},"wordCount":422,"commentCount":3,"publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"image":{"@id":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/#primaryimage"},"thumbnailUrl":"https:\/\/skatox.com\/blog\/images\/2012\/05\/ghost.png","keywords":["biografia","hacker","Hacking \/ Seguridad Inform\u00e1tica","kevin mitnick","libro","phreacker","telefonos"],"articleSection":["Hacking \/ Seguridad Inform\u00e1tica","Libros","Planetas"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/","url":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/","name":"Ghost in the Wires: Las historias de hacking de Kevin Mitnick - El blog de Skatox","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/#primaryimage"},"image":{"@id":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/#primaryimage"},"thumbnailUrl":"https:\/\/skatox.com\/blog\/images\/2012\/05\/ghost.png","datePublished":"2012-05-22T03:29:06+00:00","breadcrumb":{"@id":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/#primaryimage","url":"https:\/\/skatox.com\/blog\/images\/2012\/05\/ghost.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2012\/05\/ghost.png","width":340,"height":510,"caption":"Portada del libro"},{"@type":"BreadcrumbList","@id":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/skatox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ghost in the Wires: Las historias de hacking de Kevin Mitnick"}]},{"@type":"WebSite","@id":"https:\/\/skatox.com\/blog\/#website","url":"https:\/\/skatox.com\/blog\/","name":"El blog de Skatox","description":"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres","publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skatox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/skatox.com\/blog\/#organization","name":"El blog de Skatox","url":"https:\/\/skatox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","width":218,"height":218,"caption":"El blog de Skatox"},"image":{"@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","https:\/\/x.com\/skatox","https:\/\/www.linkedin.com\/in\/skatox\/","https:\/\/www.youtube.com\/c\/MiguelAngelUsecheCastro","https:\/\/x.com\/skatox\/"]},{"@type":"Person","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba","name":"Miguel Useche","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187","url":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187","contentUrl":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187","caption":"Miguel Useche"},"sameAs":["https:\/\/skatox.com","https:\/\/x.com\/skatox"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4670,"url":"https:\/\/skatox.com\/blog\/2023\/07\/20\/kevin-mitnick-ha-muerto\/","url_meta":{"origin":2312,"position":0},"title":"Kevin Mitnick ha muerto","author":"Miguel Useche","date":"20 de julio de 2023","format":false,"excerpt":"Lamentablemente el pasado 16 de julio del 2023 ha fallecido Kevin Mitnick. El hacker mas famoso de todos los tiempos, tal vez porque fue el primero en lograr vulnerar muchas empresas famosas y ser juzgado con muchos cargos en una \u00e9poca donde la tecnolog\u00eda digital era algo desconocido para la\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2023\/07\/image.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":2058,"url":"https:\/\/skatox.com\/blog\/2010\/12\/15\/mis-peliculas-recomendadas-sobre-hackers-programadores-e-informatica\/","url_meta":{"origin":2312,"position":1},"title":"Mis pel\u00edculas recomendadas sobre Hackers, Programadores e Inform\u00e1tica","author":"Miguel Useche","date":"15 de diciembre de 2010","format":false,"excerpt":"Este tipo de pel\u00edculas toda la vida me ha gustado, algunas me han inspirado a ser como soy profesionalmente y otras simplemente me han entretenido mucho. Hace a\u00f1os eran muy pocas, sin embargo, cada vez son mas populares y son vistas por gente\u00a0 normal o no relacionada con las tecnolog\u00edas\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4728,"url":"https:\/\/skatox.com\/blog\/2024\/04\/29\/cult-of-the-dead-cow\/","url_meta":{"origin":2312,"position":2},"title":"Cult of  the Dead Cow","author":"Miguel Useche","date":"29 de abril de 2024","format":false,"excerpt":"Si has estado involucrado en el mundo del hacking o hacktivismo desde hace tiempo. Es muy probable que hayas escuchado sobre Cult of the Dead Cow, uno de los grupos de hacking mas famosos y antiguos que existen. Fueron los primeros en realizar hacktivismo, que consisteo es el uso de\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"Portada del libro de Cult of the dead Cow","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2024\/04\/image.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":2067,"url":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/","url_meta":{"origin":2312,"position":3},"title":"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas","author":"Miguel Useche","date":"30 de diciembre de 2010","format":false,"excerpt":"El equipo de fail0verflow expuso en el pasado Chaos Communication Congress su charla 2010 Console Hacking, donde se explic\u00f3 en detalle como funciona todo el sistema de seguridad del Playstation 3, revelando sus fallas y dejando en r\u00eddiculo a Sony por cometer un error muy estupido en el algoritmo para\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":939,"url":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/","url_meta":{"origin":2312,"position":4},"title":"La historia del Hacking","author":"Miguel Useche","date":"20 de septiembre de 2009","format":false,"excerpt":"Este art\u00ed\u00adculo se parece al anterior, es otra cronolog\u00ed\u00ada que encontr\u00e9 gracias a microsiervos acerca\u00a0 de la historia del Hacking, si son fan\u00e1ticos de la seguridad inform\u00e1tica como yo. les gustar\u00e1 ya que muestra alguno de los eventos mas importantes desde el inicio del Hacking hasta nuestros dias. Sin embargo,\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3734,"url":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/","url_meta":{"origin":2312,"position":5},"title":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica","author":"Miguel Useche","date":"2 de mayo de 2018","format":false,"excerpt":"En Mozilla suelen invitar a sus oficinas grandes profesionales para compartir su experticia en un \u00e1rea. Las ponencias son compartidas en tiempo real al personal y algunos voluntarios. De esta forma todos podemos aumentar nuestros conocimientos en diversas \u00e1reas de la web abierta. Hace unas semanas estuvo Mikko Hypponen, un\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/s1y3VjZTDRk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/2312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/comments?post=2312"}],"version-history":[{"count":0,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/2312\/revisions"}],"wp:attachment":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/media?parent=2312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/categories?post=2312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/tags?post=2312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}