{"id":414,"date":"2008-10-12T22:12:51","date_gmt":"2008-10-13T02:42:51","guid":{"rendered":"https:\/\/skatox.com\/blog\/?p=414"},"modified":"2022-02-03T17:23:09","modified_gmt":"2022-02-03T22:23:09","slug":"crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo","status":"publish","type":"post","link":"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/","title":{"rendered":"Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo)"},"content":{"rendered":"\n<p>Estos d\u00ed\u00adas luego de hablar con un compa\u00f1ero de clase volv\u00ed\u00ad al hobbie de seguridad inform\u00e1tica \u00f3 hacking y aprovechando que mi padres han comprado laptops decid\u00ed\u00ad intentar escanear redes Wifi por mi casa y habian varias con WEP (que actualmente se conoce que es muy f\u00e1cil descifrar la clave mediante fuerza bruta) por lo que decid\u00ed\u00ad descifrarla usando <a href=\"https:\/\/www.backtrack-linux.org\/\" target=\"_blank\" rel=\"noopener\">Backtrack<\/a>.<\/p>\n\n\n\n<p>Buscando en Internet y luego ver miles de enlaces para hacerlo, este fue el que me gust\u00f3 mas as\u00ed\u00ad que se los comparto por si necesitan hacer algo de esto alguna vez (est\u00e1 en ingles):<\/p>\n\n\n\n<p> https:\/\/thew0rd.com\/2008\/08\/19\/tutorial-cracking-wep-using-backtrack-3\/<\/p>\n\n\n\n<p>Ahora se preguntaran&#8230; \u00bfComo evito estos ataques?, pues no existe algo que te proteja 100% sin embargo, siguiendo estas recomendaciones evitaras en gran posibilidad que llegue a suceder:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Desactiva los anuncios del ESSID (si escanean no encontraran la red).<\/li><li>Utiliza cifrado WPA2 (se puede crackear pero tarda muuucho mas).<\/li><li>Cambia la clave del router con cierta frecuencia (si consiguen la clave no duraran mucho con ella).<\/li><li>Utilizar filtrado de MAC (los atacantes tendr\u00e1n que descubrir una direcci\u00f3n MAC permitida).<\/li><li>Reducir el nivel de se\u00f1al para que alcance solo lo necesario.<\/li><\/ul>\n\n\n\n<p>Existen muchas mas, pero con estas son suficientes, espero que <strong>recuerden hacer esto de manera \u00e9tica y no para da\u00f1ar o molestar a alguien.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Estos d\u00ed\u00adas luego de hablar con un compa\u00f1ero de clase volv\u00ed\u00ad al hobbie de seguridad inform\u00e1tica \u00f3 hacking y aprovechando que mi padres han comprado&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/\">Seguir leyendo<span class=\"screen-reader-text\">Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo)<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[193],"tags":[390,947,389],"class_list":["post-414","post","type-post","status-publish","format-standard","hentry","category-hacking-seguridad-informatica","tag-backtrack","tag-hacking-seguridad-informatica","tag-wep","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo) - El blog de Skatox<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo) - El blog de Skatox\" \/>\n<meta property=\"og:description\" content=\"Estos d\u00ed\u00adas luego de hablar con un compa\u00f1ero de clase volv\u00ed\u00ad al hobbie de seguridad inform\u00e1tica \u00f3 hacking y aprovechando que mi padres han comprado&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/\" \/>\n<meta property=\"og:site_name\" content=\"El blog de Skatox\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/\" \/>\n<meta property=\"article:published_time\" content=\"2008-10-13T02:42:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-03T22:23:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"603\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Miguel Useche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skatox\" \/>\n<meta name=\"twitter:site\" content=\"@skatox\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miguel Useche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2008\\\/10\\\/12\\\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2008\\\/10\\\/12\\\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\\\/\"},\"author\":{\"name\":\"Miguel Useche\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\"},\"headline\":\"Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo)\",\"datePublished\":\"2008-10-13T02:42:51+00:00\",\"dateModified\":\"2022-02-03T22:23:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2008\\\/10\\\/12\\\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\\\/\"},\"wordCount\":229,\"commentCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"keywords\":[\"backtrack\",\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"wep\"],\"articleSection\":[\"Hacking \\\/ Seguridad Inform\u00e1tica\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2008\\\/10\\\/12\\\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2008\\\/10\\\/12\\\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2008\\\/10\\\/12\\\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\\\/\",\"name\":\"Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo) - El blog de Skatox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\"},\"datePublished\":\"2008-10-13T02:42:51+00:00\",\"dateModified\":\"2022-02-03T22:23:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2008\\\/10\\\/12\\\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2008\\\/10\\\/12\\\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2008\\\/10\\\/12\\\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"name\":\"El blog de Skatox\",\"description\":\"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres\",\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skatox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\",\"name\":\"El blog de Skatox\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"width\":218,\"height\":218,\"caption\":\"El blog de Skatox\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ElWeblogdeSkatox\\\/\",\"https:\\\/\\\/x.com\\\/skatox\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/skatox\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MiguelAngelUsecheCastro\",\"https:\\\/\\\/x.com\\\/skatox\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\",\"name\":\"Miguel Useche\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187\",\"caption\":\"Miguel Useche\"},\"sameAs\":[\"https:\\\/\\\/skatox.com\",\"https:\\\/\\\/x.com\\\/skatox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo) - El blog de Skatox","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/","og_locale":"es_ES","og_type":"article","og_title":"Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo) - El blog de Skatox","og_description":"Estos d\u00ed\u00adas luego de hablar con un compa\u00f1ero de clase volv\u00ed\u00ad al hobbie de seguridad inform\u00e1tica \u00f3 hacking y aprovechando que mi padres han comprado&#8230;","og_url":"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/","og_site_name":"El blog de Skatox","article_publisher":"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","article_published_time":"2008-10-13T02:42:51+00:00","article_modified_time":"2022-02-03T22:23:09+00:00","og_image":[{"width":625,"height":603,"url":"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png","type":"image\/png"}],"author":"Miguel Useche","twitter_card":"summary_large_image","twitter_creator":"@skatox","twitter_site":"@skatox","twitter_misc":{"Escrito por":"Miguel Useche","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/#article","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/"},"author":{"name":"Miguel Useche","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba"},"headline":"Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo)","datePublished":"2008-10-13T02:42:51+00:00","dateModified":"2022-02-03T22:23:09+00:00","mainEntityOfPage":{"@id":"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/"},"wordCount":229,"commentCount":7,"publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"keywords":["backtrack","Hacking \/ Seguridad Inform\u00e1tica","wep"],"articleSection":["Hacking \/ Seguridad Inform\u00e1tica"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/","url":"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/","name":"Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo) - El blog de Skatox","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/#website"},"datePublished":"2008-10-13T02:42:51+00:00","dateModified":"2022-02-03T22:23:09+00:00","breadcrumb":{"@id":"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/skatox.com\/blog\/2008\/10\/12\/crackear-el-cifrado-wep-usando-backtrack-3-y-como-evitarlo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/skatox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Crackear el cifrado WEP usando Backtrack 3 (y como evitarlo)"}]},{"@type":"WebSite","@id":"https:\/\/skatox.com\/blog\/#website","url":"https:\/\/skatox.com\/blog\/","name":"El blog de Skatox","description":"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres","publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skatox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/skatox.com\/blog\/#organization","name":"El blog de Skatox","url":"https:\/\/skatox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","width":218,"height":218,"caption":"El blog de Skatox"},"image":{"@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","https:\/\/x.com\/skatox","https:\/\/www.linkedin.com\/in\/skatox\/","https:\/\/www.youtube.com\/c\/MiguelAngelUsecheCastro","https:\/\/x.com\/skatox\/"]},{"@type":"Person","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba","name":"Miguel Useche","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187","url":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187","contentUrl":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187","caption":"Miguel Useche"},"sameAs":["https:\/\/skatox.com","https:\/\/x.com\/skatox"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":318,"url":"https:\/\/skatox.com\/blog\/2008\/05\/26\/obtener-privilegios-del-sistema-en-vista-con-backtrack-3\/","url_meta":{"origin":414,"position":0},"title":"Obtener privilegios del sistema en Vista con Backtrack 3","author":"Miguel Useche","date":"26 de mayo de 2008","format":false,"excerpt":"El grupo de Offensive Security ha publicado en su p\u00e1gina un v\u00ed\u00addeo tutorial de como obtener privilegios de Sistema (usuario System) en Windows Vista (ojo, no sirve en las dem\u00e1s versiones de Windows) copiando la consola de Windows (cmd.exe) en el archivo de Utility Manager (Utilman.exe), para que cuando se\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":70,"url":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/","url_meta":{"origin":414,"position":1},"title":"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux","author":"Miguel Useche","date":"12 de junio de 2006","format":false,"excerpt":"Este LiveDVD es una gran herramienta\/sue\u00f1o para Hackers, Auditores de Seguridad, Inform\u00e1ticos, etc. Pues consiste en nada mas que 10 Distribuciones de Gnu\/Linux basadas en Seguridad, las cuales corren sin tener que instalarse (sin embargo pueden instalarse si quieres) entre las cuales se incluyen: BackTrack, Operator, PHLAK, Auditor, L.A.S, Knoppix-STD,\u2026","rel":"","context":"En \u00abGnu\/Linux\u00bb","block_context":{"text":"Gnu\/Linux","link":"https:\/\/skatox.com\/blog\/category\/gnulinux\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2067,"url":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/","url_meta":{"origin":414,"position":2},"title":"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas","author":"Miguel Useche","date":"30 de diciembre de 2010","format":false,"excerpt":"El equipo de fail0verflow expuso en el pasado Chaos Communication Congress su charla 2010 Console Hacking, donde se explic\u00f3 en detalle como funciona todo el sistema de seguridad del Playstation 3, revelando sus fallas y dejando en r\u00eddiculo a Sony por cometer un error muy estupido en el algoritmo para\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":939,"url":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/","url_meta":{"origin":414,"position":3},"title":"La historia del Hacking","author":"Miguel Useche","date":"20 de septiembre de 2009","format":false,"excerpt":"Este art\u00ed\u00adculo se parece al anterior, es otra cronolog\u00ed\u00ada que encontr\u00e9 gracias a microsiervos acerca\u00a0 de la historia del Hacking, si son fan\u00e1ticos de la seguridad inform\u00e1tica como yo. les gustar\u00e1 ya que muestra alguno de los eventos mas importantes desde el inicio del Hacking hasta nuestros dias. Sin embargo,\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4561,"url":"https:\/\/skatox.com\/blog\/2023\/04\/03\/documentales-de-google-sobre-hacking\/","url_meta":{"origin":414,"position":4},"title":"Documentales de Google sobre Hacking","author":"Miguel Useche","date":"3 de abril de 2023","format":false,"excerpt":"Hace un par de meses Google liber\u00f3 una serie de seis videos sobre Hacking. Los cuales abarcan temas como introducci\u00f3n al hacking y cuenta casos reales donde Google ha sido v\u00edctima o han tenido que intervenir. Enumerados desde el 0 tal como se numera en la inform\u00e1tica, cada episodio ofrece\u2026","rel":"","context":"En \u00abDocumentales o Videos\u00bb","block_context":{"text":"Documentales o Videos","link":"https:\/\/skatox.com\/blog\/category\/videos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3734,"url":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/","url_meta":{"origin":414,"position":5},"title":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica","author":"Miguel Useche","date":"2 de mayo de 2018","format":false,"excerpt":"En Mozilla suelen invitar a sus oficinas grandes profesionales para compartir su experticia en un \u00e1rea. Las ponencias son compartidas en tiempo real al personal y algunos voluntarios. De esta forma todos podemos aumentar nuestros conocimientos en diversas \u00e1reas de la web abierta. Hace unas semanas estuvo Mikko Hypponen, un\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/s1y3VjZTDRk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/comments?post=414"}],"version-history":[{"count":0,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/414\/revisions"}],"wp:attachment":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/media?parent=414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/categories?post=414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/tags?post=414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}