<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8212444198868605578</id><updated>2025-12-24T09:14:19.040-08:00</updated><category term="General"/><category term="Conferencias"/><category term="Privacidad"/><category term="Rootedcon"/><category term="WhatsApp"/><category term="Android"/><category term="Defcon"/><category term="Pentesting"/><category term="Anonimato"/><category term="Herramientas"/><category term="Linux"/><category term="PRISM"/><category term="Snapchat"/><category term="iOS"/><category term="Espionaje"/><category term="Móvil"/><category term="NuitDuHack"/><category term="Videos"/><category term="AndroIDS"/><category term="Arsenal"/><category term="Blackhat"/><category term="ESET Security Forum"/><category term="NSA"/><category term="Rooted Warfare"/><category term="Shmoocon"/><category term="p0f"/><category term="Malware"/><category term="nmap"/><category term="Aplicaciones"/><category term="CCN-CERT"/><category term="FunXMPP"/><category term="IDS"/><category term="NoConName"/><category term="OSfooler"/><category term="Raspberry Pi"/><category term="Viber"/><category term="password cracking"/><category term="seguridad bancaria"/><category term="APT"/><category term="DeepSec"/><category term="Derbycon"/><category term="Entrevista"/><category term="HackInParis"/><category term="Hacktivity"/><category term="Rooted2014"/><category term="RootedPanel"/><category term="Windows"/><category term="iPhone"/><category term="2080ti"/><category term="Buscadores"/><category term="Fail"/><category term="Gobierno España"/><category term="Google"/><category term="HighsecCON"/><category term="IE"/><category term="Infosec 2002"/><category term="Juegos"/><category term="Kaonashi"/><category term="Master"/><category term="Microsoft"/><category term="Ministerio Hacienda"/><category term="Preguntados"/><category term="Radio"/><category term="Radio3W"/><category term="Servicios"/><category term="Snort"/><category term="WhatsApp Privacy Guard"/><category term="egambling"/><category term="fraude"/><category term="geolocalizacion"/><category term="hashcat"/><category term="scam"/><category term="workshop"/><title type='text'>Seguridad Ofensiva</title><subtitle type='html'>Seguridad | hacking | security research | vulnerabilities | pentesting | mucho mas...</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>70</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-5454180523545386062</id><published>2019-06-17T00:21:00.000-07:00</published><updated>2019-06-19T08:30:06.107-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonimato"/><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="egambling"/><category scheme="http://www.blogger.com/atom/ns#" term="geolocalizacion"/><category scheme="http://www.blogger.com/atom/ns#" term="Gobierno España"/><category scheme="http://www.blogger.com/atom/ns#" term="Ministerio Hacienda"/><category scheme="http://www.blogger.com/atom/ns#" term="p0f"/><category scheme="http://www.blogger.com/atom/ns#" term="workshop"/><title type='text'>Hoy estaré de ponente en el &quot;RegTech egambling international Workshop&quot; (slides)</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7H6t4rWL4c7Bju3dJMNRJRvI3tjiBE0VyvqD1G8sCwNpPQT_x1Aigf2iEFp8eitzmFgeMfCfkUM5R6rftdCcSFdfEzLMp7u8FPqJVFL7rVc6j5630jnezFj5WsdmQwfSCEMtjAOSfU5Fc/s1600/Captura+de+pantalla+2019-06-17+a+las+9.10.46.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;622&quot; data-original-width=&quot;1600&quot; height=&quot;248&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7H6t4rWL4c7Bju3dJMNRJRvI3tjiBE0VyvqD1G8sCwNpPQT_x1Aigf2iEFp8eitzmFgeMfCfkUM5R6rftdCcSFdfEzLMp7u8FPqJVFL7rVc6j5630jnezFj5WsdmQwfSCEMtjAOSfU5Fc/s640/Captura+de+pantalla+2019-06-17+a+las+9.10.46.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #333333;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
El próximo 17 de Junio por la mañana se celebrará la primera edición del &quot;&lt;a href=&quot;http://www.ordenacionjuego.es/es/noticia-RegTech-egalmbling-2019&quot; target=&quot;_blank&quot;&gt;RegTech egambling international workshop&lt;/a&gt;&quot; organizado por la &lt;a href=&quot;http://www.ordenacionjuego.es/es&quot; target=&quot;_blank&quot;&gt;Dirección General de Ordenación del Juego&lt;/a&gt;, en el&amp;nbsp;&lt;span style=&quot;font-size: 0.9rem;&quot;&gt;Auditorio CaixaForum de Madrid.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: 0.9rem;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Durante el evento, que se desarrollará en la ciudad de Madrid, se realizarán distintas sesiones prácticas relacionadas con el uso de la tecnología en el sector del juego online:&amp;nbsp; identificación biométrica; se realizarán aproximaciones prácticas relacionadas con el fraude en los medios de pago o la geolocalización en internet; y por último, y en lo que se refiere propiamente a la actividad de juego, se efectuarán ponencias relacionadas con el seguimiento y análisis de los patrones de juego de los participantes a los efectos de detectar conductas de juego problemáticas.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Yo estaré de ponente y &lt;b&gt;abordaré la problemática de la identificación de los participantes en las plataformas de juego online a través de procesos de &quot;digital onboarding&quot;&lt;/b&gt;.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Podéis acceder a la agenda completa del evento en el siguiente &lt;a href=&quot;https://www.ordenacionjuego.es/sites/ordenacionjuego.es/files/noticias/dgoj_flyer_regtechegambling_2019_en.pdf&quot; target=&quot;_blank&quot;&gt;enlace&lt;/a&gt;:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio2j3F6Js93KxUJi4iub2-UIwC7VWgtYlY1YlvEtT9tI5SD6lZ7XNkLQalz7k1X1UHygq3p7JucmzE3qzmDYc0LGCtKoP3mwhs3p93z2-xniVtmRRusPqJchgnO75OqSU9T7xT5jmFeg-N/s1600/Captura+de+pantalla+2019-06-17+a+las+9.16.20.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1600&quot; data-original-width=&quot;1305&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio2j3F6Js93KxUJi4iub2-UIwC7VWgtYlY1YlvEtT9tI5SD6lZ7XNkLQalz7k1X1UHygq3p7JucmzE3qzmDYc0LGCtKoP3mwhs3p93z2-xniVtmRRusPqJchgnO75OqSU9T7xT5jmFeg-N/s640/Captura+de+pantalla+2019-06-17+a+las+9.16.20.png&quot; width=&quot;522&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Por si alguien no ha podido acudir al evento y quiere conocer algo más sobre el tema, a continuación tenéis disponibles las slides:&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;485&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;//www.slideshare.net/slideshow/embed_code/key/czrZzsByzmSZPR&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;595&quot;&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;span style=&quot;font-size: 14.4px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
Si alguien va a asistir y quiere tomar un café y charlar un rato, que me avise }:)&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/5454180523545386062/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2019/06/ponente-en-RegTech-egambling-international-Workshop-2019.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/5454180523545386062'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/5454180523545386062'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2019/06/ponente-en-RegTech-egambling-international-Workshop-2019.html' title='Hoy estaré de ponente en el &quot;RegTech egambling international Workshop&quot; (slides)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7H6t4rWL4c7Bju3dJMNRJRvI3tjiBE0VyvqD1G8sCwNpPQT_x1Aigf2iEFp8eitzmFgeMfCfkUM5R6rftdCcSFdfEzLMp7u8FPqJVFL7rVc6j5630jnezFj5WsdmQwfSCEMtjAOSfU5Fc/s72-c/Captura+de+pantalla+2019-06-17+a+las+9.10.46.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-4213779066117051262</id><published>2019-05-29T02:21:00.000-07:00</published><updated>2019-05-30T03:03:31.615-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="Defcon"/><category scheme="http://www.blogger.com/atom/ns#" term="Herramientas"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="nmap"/><category scheme="http://www.blogger.com/atom/ns#" term="OSfooler"/><category scheme="http://www.blogger.com/atom/ns#" term="p0f"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentesting"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacidad"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>OS fingerprinting: a brief history</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr7sn0Zw5k0BJrhwqkv67vRuFc4uazniraTO3IRjfS3JXE8fsAfODUJp-WNTgLORg3UEHeNdqmOGtpQvZxWfvW3xxGUwUuM9y5CZO2p3hYcyQhwEhIz7BuoMTEvDzEGuqXnaZVaNgC_X5Z/s1600/hack-like-pro-conduct-passive-os-fingerprinting-with-p0f.1280x600.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;600&quot; data-original-width=&quot;1280&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr7sn0Zw5k0BJrhwqkv67vRuFc4uazniraTO3IRjfS3JXE8fsAfODUJp-WNTgLORg3UEHeNdqmOGtpQvZxWfvW3xxGUwUuM9y5CZO2p3hYcyQhwEhIz7BuoMTEvDzEGuqXnaZVaNgC_X5Z/s640/hack-like-pro-conduct-passive-os-fingerprinting-with-p0f.1280x600.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In this post I will show some historical techniques, tools and countermeasures I will be showing in&amp;nbsp;&lt;a href=&quot;https://www.defcon.org/html/dc-china-1/dc-cn-1-speakers.html#Sanchez&quot; target=&quot;_blank&quot;&gt;Derevolutionizing OS Fingerprinting: The Cat and Mouse Game&lt;/a&gt;&amp;nbsp;at&amp;nbsp;&lt;a href=&quot;https://www.defcon.org/html/dc-china-1/dc-cn-1-index.html&quot; target=&quot;_blank&quot;&gt;Defcon China&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
OS fingerprinting describes the method of utilising gathered information of a target host to find out what OS the machine is running on.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Wikipedia describes it as:&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;“ TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote machine&#39;s operating system (aka, OS fingerprinting), or incorporated into a device fingerprint ”&lt;/i&gt;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
There are multiple approaches for finding out the OS of an unknown host without having an account, or any way of logging on the machine:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Banner Information &amp;amp; Manual Reconnaissance&lt;/li&gt;
&lt;li&gt;Active Fingerprinting&lt;/li&gt;
&lt;li&gt;Passive Fingerprinting&lt;/li&gt;
&lt;li&gt;Timing Analysis Fingerprinting&lt;/li&gt;
&lt;/ul&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
BANNER GRABBING / MANUAL&lt;/h2&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtbk3-ZaKlkpSTdlpEbt86MQBIZCYCcJIXRoweZ_OHXlwmxBEqynkDBQLgOVREML2cjQUoZlAcmtIR5bGo4UzBco1YWRRZ6mtquxhxS5sbXLlxPg3JEfKKr7Q5Mc1ef0NZ6aBmt4rjkrKw/s1600/osf_1.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;613&quot; data-original-width=&quot;1024&quot; height=&quot;383&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtbk3-ZaKlkpSTdlpEbt86MQBIZCYCcJIXRoweZ_OHXlwmxBEqynkDBQLgOVREML2cjQUoZlAcmtIR5bGo4UzBco1YWRRZ6mtquxhxS5sbXLlxPg3JEfKKr7Q5Mc1ef0NZ6aBmt4rjkrKw/s640/osf_1.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Other services that send back ‘free’ useful information include IMAP,POP2, POP3, SMTP, SSH, NNTP and FINGER.&amp;nbsp; This technique is reasonably reliable even now and automated tools exist to make the process simple and painless.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Even, with access to remote host, you could play with the following commands until you get what you want:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;uname -a, or uname -o or uname -v&lt;/li&gt;
&lt;li&gt;lsb_release -a&lt;/li&gt;
&lt;li&gt;cat /proc/version&lt;/li&gt;
&lt;li&gt;cat /etc/*-release&lt;/li&gt;
&lt;li&gt;cat /etc/issue*&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxzyz7AFBSGmvdYWP3N5z_a53GQkfQ9CAR6pbS6CTb6ICQUCDYhyphenhyphenrLXHl0tJzeRe6iLGdYNBBvBEVbjsiAbEEYmmdhZ9Zt0mRmobCmOuFhlVgtM0t0bU1UZ_eUot0443I3IyZHmPQVeqHy/s1600/Captura+de+pantalla+2019-05-29+a+las+1.13.31.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;694&quot; data-original-width=&quot;1600&quot; height=&quot;276&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxzyz7AFBSGmvdYWP3N5z_a53GQkfQ9CAR6pbS6CTb6ICQUCDYhyphenhyphenrLXHl0tJzeRe6iLGdYNBBvBEVbjsiAbEEYmmdhZ9Zt0mRmobCmOuFhlVgtM0t0bU1UZ_eUot0443I3IyZHmPQVeqHy/s640/Captura+de+pantalla+2019-05-29+a+las+1.13.31.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
A more primitive approach is to port scan the machine using any of the common port scanners freely available and examine the returned list of listening ports for patterns common to a particular OS. &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Banners can also be revealed in an indirect way too, for example email headers often contain the version string of the client that is used by a user, and sometimes the OS version also. &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Another example could be the SYST commando in FTP; a SYST request asks for information about the server&#39;s operating system. The server accepts this request with code 215. For example:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGQ2SNaX_MOiHUxeW3DaihqkgBjuVwyH78bS7v-QHKv7PrAVrtnwIGYxQdJEXR5df4s1x8MVSUJdggkjoHhoR66B9JdayKTwtOza9IErkyx18YwnIn6fo5F9z6LuB7DCWtz7BjwmfHVZzd/s1600/Sin+ti%25CC%2581tulo.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;339&quot; data-original-width=&quot;1600&quot; height=&quot;134&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGQ2SNaX_MOiHUxeW3DaihqkgBjuVwyH78bS7v-QHKv7PrAVrtnwIGYxQdJEXR5df4s1x8MVSUJdggkjoHhoR66B9JdayKTwtOza9IErkyx18YwnIn6fo5F9z6LuB7DCWtz7BjwmfHVZzd/s640/Sin+ti%25CC%2581tulo.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Examples from other servers: &lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;215 UNIX Type: L8 Version: BSD-44 &amp;nbsp; &amp;nbsp; &lt;/li&gt;
&lt;li&gt;215 NetWare system type. &amp;nbsp; &amp;nbsp; &lt;/li&gt;
&lt;li&gt;215 MACOS Peter&#39;s Server &amp;nbsp; &amp;nbsp; &lt;/li&gt;
&lt;li&gt;215 AmigaOS&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
Another way to get more information is analysing offered files, like trying to download:&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;compress&lt;/li&gt;
&lt;li&gt;ls&lt;/li&gt;
&lt;li&gt;tar&lt;/li&gt;
&lt;li&gt;gzip&lt;/li&gt;
&lt;li&gt;gunzip&lt;/li&gt;
&lt;li&gt;compress&lt;/li&gt;
&lt;li&gt;zcat&lt;/li&gt;
&lt;li&gt;etc.&lt;/li&gt;
&lt;/ul&gt;
Then, use the file command to determine the file type:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrmspHVtd-nzTY8ac4TpQ-hjixyY4fQxf-7lNk9LEH_rPnYCxI5CQK4GiqzR78yOz3O8y3Oh71hYadWNOT9j4IYynS0Af04Y6UsRhtrGrSNCf1f5UEDjKPyItpPVqyxmQ-tRzRkPm9dDSu/s1600/osf4.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;211&quot; data-original-width=&quot;1525&quot; height=&quot;88&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrmspHVtd-nzTY8ac4TpQ-hjixyY4fQxf-7lNk9LEH_rPnYCxI5CQK4GiqzR78yOz3O8y3Oh71hYadWNOT9j4IYynS0Af04Y6UsRhtrGrSNCf1f5UEDjKPyItpPVqyxmQ-tRzRkPm9dDSu/s640/osf4.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Finally, it may be possible to determine the OS of a system by a non-technical solution, such as social engineering.&amp;nbsp; Learning about the target through phone calls, chatting to the System Administrator, or even a public site tour are all possibilities&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
ACTIVE OS FINGERPRINTING&lt;/h2&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Active fingerprinting is the process of transmitting packets to a remote host and analysing corresponding replies.&lt;br /&gt;
&lt;br /&gt;
This allows the scanner to obtain more accurate results than a passive scanner, and in a shorter amount of time. The traditional approach is to examine the TCP/IP stack behaviour of a targeted network element when probed with several legitimate packets&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;https://nmap.org/&quot; target=&quot;_blank&quot;&gt;Nmap&lt;/a&gt; is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts.
&lt;br /&gt;&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.adminso.es/index.php/Xprobe2&quot; target=&quot;_blank&quot;&gt;Xprobe2&lt;/a&gt; is an active operating system fingerprinting tool with a different approach to operating system fingerprinting. Xprobe2 relies on fuzzy signature matching, probabilistic guesses and multiple simultaneous matches, and a signature database.
&lt;br /&gt;&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;http://www.apostols.org/projectz/queso&quot; target=&quot;_blank&quot;&gt;Queso&lt;/a&gt;: Hispanic shortcut to “Que Sistema Operativo”, with translates into &quot;Which Operating System&quot;. Sends different types of packets to open ports on targets hosts, each one with different TCP headers, and compares the responses with the config file, where the different Ones are described&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
PASSIVE OS FINGERPRINTING&lt;/h2&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Passive fingerprinting is the process of analysing packets from a host on a network. In this case, the fingerprinter acts as a sniffer and doesn’t put any traffic on a network. It is called passive because it doesn’t involve communicating with the host being examined.Based on the sniffer traces of these packets, you can determine the operating system of the remote host. Passive scanners are generally and inherently less accurate than active scanners, due to the fact they have less control over the data they are analyzing.&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://lcamtuf.coredump.cx/p0f3/README&quot; target=&quot;_blank&quot;&gt;p0f&lt;/a&gt; is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. Version 3 is a complete rewrite of the original codebase, incorporating a significant number of improvements to network-level fingerprinting, and introducing the ability to reason about application-level payloads (e.g., HTTP).&lt;br /&gt;
&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.ettercap-project.org/&quot; target=&quot;_blank&quot;&gt;Ettercap&lt;/a&gt; is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
DHCP FINGERPRINTING&lt;/h2&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
A device will generally issue a DHCP request on the network upon connection. It is the DHCP client of the operating system that issues a DHCP request on the network. When doing so, it asks for DHCP options (like DNS Server, WINS server, default gateway, etc.).&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The order in which the DHCP client asks for those options is relatively unique and identifies the specific operating system version. The same principle applies to DHCPv6.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAw27j8rE610Ii_JUcDCUJ45kguJGdnJvaurNPFLW3VGfRHe5jtPUHBpHaE08-WwTmHng_iQm8Qa5j3OPJbv1T81qAHXG7BvzFeX9i9QfteTwCcVMr_407PLiD5VgTMYmn04ubvfUGAI42/s1600/dhcp4.JPG&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;220&quot; data-original-width=&quot;743&quot; height=&quot;188&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAw27j8rE610Ii_JUcDCUJ45kguJGdnJvaurNPFLW3VGfRHe5jtPUHBpHaE08-WwTmHng_iQm8Qa5j3OPJbv1T81qAHXG7BvzFeX9i9QfteTwCcVMr_407PLiD5VgTMYmn04ubvfUGAI42/s640/dhcp4.JPG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
There is a great paper from Eric Kollmann, called &lt;a href=&quot;http://chatteronthewire.org/download/chatter-dhcp.pdf&quot; target=&quot;_blank&quot;&gt;Chatter on the Wire: a look at DHCP traffic&lt;/a&gt; that explains this technique.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Also, &lt;a href=&quot;http://chatteronthewire.org/&quot; target=&quot;_blank&quot;&gt;Satori&lt;/a&gt; performs passive OS identification on any packets it sees. It can parse and utilize the following packet types: DHCP, TCP (syn and syn/ack), ICMP, SMB, CDP, plus many others.&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style=&quot;text-align: justify;&quot;&gt;
COUNTERMEASURES&lt;/h2&gt;
&lt;h3 style=&quot;text-align: justify;&quot;&gt;
IP PERSONALITY&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The &lt;a href=&quot;http://ippersonality.sourceforge.net/&quot; target=&quot;_blank&quot;&gt;Linux IP Personality patch&lt;/a&gt; adds to Linux 2.4 kernel the ability to have different &#39;personalities&#39; network wise, that is to change some characteristics of its network traffic, depending on different parameters (anything you can specify in an iptables rule: src/dst IP address, TCP or UDP port, etc.)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The characteristics that can be changed are:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;TCP Initial Sequence Number (ISN)&lt;/li&gt;
&lt;li&gt;TCP initial window size&lt;/li&gt;
&lt;li&gt;TCP options (their types, values and order in the packet)&lt;/li&gt;
&lt;li&gt;IP ID numbers&lt;/li&gt;
&lt;li&gt;answers to some pathological TCP packets&lt;/li&gt;
&lt;li&gt;answers to some UDP packets&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
They are deeply configurable. This patch relies on the framework created by Rusty Russel: netfilter. More precisely, the patch adds a new iptables target (in a kernel module) that can be used in the mangle table with a (patched) iptables.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: justify;&quot;&gt;
STEALTH PATCH&lt;/h3&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.innu.org/~sean/&quot; target=&quot;_blank&quot;&gt;Stealth patch&lt;/a&gt; works for Linux kernels of version 2.2.19 through 2.2.22 and of version 2.4.19. When this patch is applied, all packets with both FIN and SYN flag set are discarded. Furthermore, all packets with one specific reserved bit set and all packets that match nmaps probe 2 (this means the ACK, FIN, RST and SYN flags are not set) are dropped&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Though the Stealth Patch does not enable a host to fein being some other operating system, it still can confuse a fingerprinting application by droping specific packets that are typical for a OS detector. The downside of an unmodified Stealth Patch is, since only a few kernel versions were supported, this behaviour could give away valuable info to a fingerprinter again.&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: justify;&quot;&gt;
IPlog&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In contrary to the described methods up to now, &lt;a href=&quot;http://ojnk.sourceforge.net/stuff/iplog.readme&quot; target=&quot;_blank&quot;&gt;IPlog&lt;/a&gt; is not a kernel module but a standalone application. Although mainly written for detecting port scans, it includes the ability to try to fool nmap. It detects TCP Null and FIN scans, UDP and ICMP ”smurf” attacks, bogus TCP flags, TCP SYN and ”Xmas” scans.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: justify;&quot;&gt;
FINGERPRINT FUCKER&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Kernel module available for version 2.2 that also tries to hide original OS and act as a different one. Per default, it will emulate the behaviour of a VAX device, but it can be configured by parsing a nmap signature file and hands over the values to the module.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: justify;&quot;&gt;
MORPH&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.synacklabs.net/&quot; target=&quot;_blank&quot;&gt;Morph&lt;/a&gt; handles inbound and outbound packets and change TCP, UDP, ICMP and IP headers to reflect selected OS. Worked under Linux, and under development for OpenBSD, FreeBSD and NetBSD. Built on Packet Purgatory Library (relies on libpcap and libdnet libraries), that acts as a wedge between OS kernel and network interface running in user land.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The&amp;nbsp; key&amp;nbsp; variable&amp;nbsp; in&amp;nbsp; these&amp;nbsp; functions&amp;nbsp; is&amp;nbsp; the&amp;nbsp; variable&amp;nbsp; packet.&amp;nbsp; This&amp;nbsp; is&amp;nbsp; a&amp;nbsp; buffer&amp;nbsp; that contains&amp;nbsp; the&amp;nbsp; contents&amp;nbsp; of&amp;nbsp; the&amp;nbsp; packet.&amp;nbsp; If&amp;nbsp; the&amp;nbsp; packet&amp;nbsp; handler&amp;nbsp; functions&amp;nbsp; returns&amp;nbsp; zero, whatever&amp;nbsp; is&amp;nbsp; in&amp;nbsp; the&amp;nbsp; buffer&amp;nbsp; at&amp;nbsp; that&amp;nbsp; time&amp;nbsp; will&amp;nbsp; be&amp;nbsp; reinjected&amp;nbsp; to&amp;nbsp; the&amp;nbsp; network.&amp;nbsp; So&amp;nbsp; by modifying the buffer, it modify the packet that will be sent/received.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The&amp;nbsp; inbound&amp;nbsp; packet&amp;nbsp; handler&amp;nbsp; will&amp;nbsp; be&amp;nbsp; called&amp;nbsp; for&amp;nbsp; each&amp;nbsp; packet&amp;nbsp; heading&amp;nbsp; out&amp;nbsp; from&amp;nbsp; the system&amp;nbsp; running&amp;nbsp; Packet&amp;nbsp; Purgatory,&amp;nbsp; before&amp;nbsp; that&amp;nbsp; packet&amp;nbsp; reaches&amp;nbsp; the&amp;nbsp; network,&amp;nbsp; and&amp;nbsp; the inbound&amp;nbsp; packet&amp;nbsp; handler&amp;nbsp; will&amp;nbsp; be&amp;nbsp; called&amp;nbsp; for&amp;nbsp; each&amp;nbsp; packet&amp;nbsp; inbound&amp;nbsp; to&amp;nbsp; the&amp;nbsp; system,&amp;nbsp; but before&amp;nbsp; the&amp;nbsp; system&#39;s&amp;nbsp; kernel&amp;nbsp; starts&amp;nbsp; processing&amp;nbsp; it. The&amp;nbsp; State&amp;nbsp; Table&amp;nbsp; works&amp;nbsp; when&amp;nbsp; ever&amp;nbsp; host&amp;nbsp; sends&amp;nbsp; packet&amp;nbsp; by generating a “random” sequence number based on emulated OS. State table maintains session sequence number offset&amp;nbsp; information. Hence, Sequence number gets modified on the way to remote OS.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;
EVOLUTION: OSfooler-ng&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://github.com/segofensiva/OSfooler-NG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;512&quot; data-original-width=&quot;512&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiKpjAQ798O9xsRoW-wNUsMhS00nCP0vuVP86MlK7bpzzAAZSjQ_dm9Y8d1LTwH3Wc6RbjHi5r_skS9QZXP7Dqj5jienzH539aWuDdvP6aACdjq5H56Y50BrSwXvWhsl6iGXap6_0meIuEb/s200/68747470733a2f2f692e6962622e636f2f444c6e4e4b394a2f3236383439372e706e67.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://github.com/segofensiva/OSfooler-NG&quot; target=&quot;_blank&quot;&gt;OSfooler-ng&lt;/a&gt; has been complete rewriten from the ground up, being highly portable, more efficient and combining all known techniques to detect and defeat at the same time:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Active remote OS fingerprinting: like Nmap&lt;/li&gt;
&lt;li&gt;Passive remote OS fingeprinting: like p0f v2&lt;/li&gt;
&lt;li&gt;Commercial engines like Sourcefire’s FireSiGHT OS fingerprinting&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Some additional features are:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;No need for kernel modification or patches&lt;/li&gt;
&lt;li&gt;Simple user interface and several logging features&lt;/li&gt;
&lt;li&gt;Transparent for users, internal process and services&lt;/li&gt;
&lt;li&gt;Detecting and defeating mode: active, passive &amp;amp; combined&lt;/li&gt;
&lt;li&gt;Will emulate any OS&lt;/li&gt;
&lt;li&gt;Capable of handling updated nmap and p0f v2 fingerprint database&lt;/li&gt;
&lt;li&gt;Undetectable for the attacker&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
In future posts, we will see more in detail the operation of &lt;a href=&quot;https://nmap.org/&quot; target=&quot;_blank&quot;&gt;nmap&lt;/a&gt; and &lt;a href=&quot;http://lcamtuf.coredump.cx/p0f3/&quot; target=&quot;_blank&quot;&gt;p0f v2&lt;/a&gt;, and how &lt;a href=&quot;https://github.com/segofensiva/OSfooler-NG&quot; target=&quot;_blank&quot;&gt;OSfooler-ng &lt;/a&gt;can defeat both tools and their analysis techniques.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/4213779066117051262/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2019/05/os-fingerprinting-a-brief-history.html#comment-form' title='1 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/4213779066117051262'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/4213779066117051262'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2019/05/os-fingerprinting-a-brief-history.html' title='OS fingerprinting: a brief history'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr7sn0Zw5k0BJrhwqkv67vRuFc4uazniraTO3IRjfS3JXE8fsAfODUJp-WNTgLORg3UEHeNdqmOGtpQvZxWfvW3xxGUwUuM9y5CZO2p3hYcyQhwEhIz7BuoMTEvDzEGuqXnaZVaNgC_X5Z/s72-c/hack-like-pro-conduct-passive-os-fingerprinting-with-p0f.1280x600.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-8071930456050084911</id><published>2019-05-27T00:52:00.001-07:00</published><updated>2019-05-27T02:37:13.765-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Arsenal"/><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="Defcon"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="nmap"/><category scheme="http://www.blogger.com/atom/ns#" term="OSfooler"/><category scheme="http://www.blogger.com/atom/ns#" term="p0f"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentesting"/><title type='text'>OSfooler-ng v1.0 released</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcJoD4j2yVn-X3b7H_WbCwRXFwMuvSwFqjsejVWa9QatOWWKXOd21yUxjuzRTRwi0RiC_ypP9Jsc1FJq7KJ4NjgTbmRQxCmerpKuKTy5Kgu3bj2xDA1ZXMSYXemLyZ1DZl78DO5WzXKF_t/s1600/268497.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;512&quot; data-original-width=&quot;512&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcJoD4j2yVn-X3b7H_WbCwRXFwMuvSwFqjsejVWa9QatOWWKXOd21yUxjuzRTRwi0RiC_ypP9Jsc1FJq7KJ4NjgTbmRQxCmerpKuKTy5Kgu3bj2xDA1ZXMSYXemLyZ1DZl78DO5WzXKF_t/s320/268497.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Take a look a the oficial repository of &lt;a href=&quot;https://github.com/segofensiva/OSfooler-ng&quot; target=&quot;_blank&quot;&gt;OSfooler-ng at Github&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
An outsider has the capability to discover general information, such as which operating system a host is running, by searching for default stack parameters, ambiguities in IETF RFCs or non-compliant TCP/IP implementations in responses to malformed requests. By pinpointing the exact OS of a host, an attacker can launch an educated and precise attack against a target machine.&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
There are lot of reasons to hide your OS to the entire world:&lt;/div&gt;
&lt;/div&gt;
&lt;ul style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px; margin-top: 0px; padding-left: 2em;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Revealing your OS makes things easier to find and successfully run an exploit against any of your devices.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;Having and unpatched or antique OS version is not very convenient for your company prestige. Imagine that your company is a bank and some users notice that you are running an unpatched box. They won&#39;t trust you any longer! In addition, these kind of &#39;bad&#39; news are always sent to the public opinion.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;Knowing your OS can also become more dangerous, because people can guess which applications are you running in that OS (data inference). For example if your system is a MS Windows, and you are running a database, it&#39;s highly likely that you are running MS-SQL.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;It could be convenient for other software companies, to offer you a new OS environment (because they know which you are running).&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;And finally, privacy; nobody needs to know the systems you&#39;ve got running.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
OSfooler was presented at Blackhat Arsenal 2013. It was built on NFQUEUE, an iptables/ip6tables target which delegate the decision on packets to a userspace. It transparently intercepted all traffic that your box was sending in order to camouflage and modify in real time the flags in TCP/IP packets that discover your system.&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
OSfooler-NG has been complete rewriten from the ground up, being highly portable, more efficient and combining all known techniques to detect and defeat at the same time:&lt;/div&gt;
&lt;/div&gt;
&lt;ul style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px; margin-top: 0px; padding-left: 2em;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;Active remote OS fingerprinting: like Nmap&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;Passive remote OS fingeprinting: like p0f v2&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;Commercial engines like Sourcefire’s FireSiGHT OS fingerprinting&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Some additional features are:&lt;/div&gt;
&lt;/div&gt;
&lt;ul style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px; margin-top: 0px; padding-left: 2em;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box; text-align: justify;&quot;&gt;No need for kernel modification or patches&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;Simple user interface and several logging features&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;Transparent for users, internal process and services&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;Detecting and defeating mode: active, passive &amp;amp; combined&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;Will emulate any OS&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;Capable of handling updated nmap and p0f v2 fingerprint database&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em; text-align: justify;&quot;&gt;Undetectable for the attacker&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Install&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
To get the latest versions, with bugfixes and new features, but maybe not as stable, use the the Github repository:&lt;/div&gt;
&lt;pre style=&quot;background-color: #f6f8fa; border-radius: 3px; box-sizing: border-box; color: #24292e; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: 1.45; margin-bottom: 16px; overflow-wrap: normal; overflow: auto; padding: 16px;&quot;&gt;&lt;code style=&quot;background: transparent; border-radius: 3px; border: 0px; box-sizing: border-box; display: inline; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: inherit; margin: 0px; overflow-wrap: normal; overflow: visible; padding: 0px; word-break: normal;&quot;&gt;$ git clone https://github.com/segofensiva/OSfooler-ng.git
&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
You need to install python-nfqueue (v0.5-1build2) linux package. Download from&amp;nbsp;&lt;a href=&quot;https://packages.ubuntu.com/xenial/python-nfqueue&quot; rel=&quot;nofollow&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; text-decoration-line: none;&quot;&gt;Ubuntu Packages&lt;/a&gt;:&lt;/div&gt;
&lt;pre style=&quot;background-color: #f6f8fa; border-radius: 3px; box-sizing: border-box; color: #24292e; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: 1.45; margin-bottom: 16px; overflow-wrap: normal; overflow: auto; padding: 16px;&quot;&gt;&lt;code style=&quot;background: transparent; border-radius: 3px; border: 0px; box-sizing: border-box; display: inline; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: inherit; margin: 0px; overflow-wrap: normal; overflow: visible; padding: 0px; word-break: normal;&quot;&gt;$ wget http://mirrors.kernel.org/ubuntu/pool/universe/n/nfqueue-bindings/python-nfqueue_0.5-1build2_amd64.deb
$ dpkg -i python-nfqueue_0.5-1build2_amd64.deb
&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
Install OSfooler-ng in the standard way:&lt;/div&gt;
&lt;pre style=&quot;background-color: #f6f8fa; border-radius: 3px; box-sizing: border-box; color: #24292e; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: 1.45; margin-bottom: 16px; overflow-wrap: normal; overflow: auto; padding: 16px;&quot;&gt;&lt;code style=&quot;background: transparent; border-radius: 3px; border: 0px; box-sizing: border-box; display: inline; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: inherit; margin: 0px; overflow-wrap: normal; overflow: visible; padding: 0px; word-break: normal;&quot;&gt;$ sudo python setup.py install
&lt;/code&gt;&lt;/pre&gt;
&lt;h1 style=&quot;background-color: white; border-bottom: 1px solid rgb(234, 236, 239); box-sizing: border-box; color: #24292e; line-height: 1.25; margin: 24px 0px 16px; padding-bottom: 0.3em;&quot;&gt;
&lt;a aria-hidden=&quot;true&quot; class=&quot;anchor&quot; href=&quot;https://github.com/segofensiva/OSfooler-ng#usage&quot; id=&quot;user-content-usage&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; float: left; line-height: 1; margin-left: -20px; padding-right: 4px; text-decoration-line: none;&quot;&gt;&lt;svg aria-hidden=&quot;true&quot; class=&quot;octicon octicon-link&quot; height=&quot;16&quot; version=&quot;1.1&quot; viewbox=&quot;0 0 16 16&quot; width=&quot;16&quot;&gt;&lt;path d=&quot;M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z&quot; fill-rule=&quot;evenodd&quot;&gt;&lt;/path&gt;&lt;/svg&gt;&lt;/a&gt;Usage&lt;/h1&gt;
&lt;h2 style=&quot;background-color: white; border-bottom: 1px solid rgb(234, 236, 239); box-sizing: border-box; color: #24292e; line-height: 1.25; margin-bottom: 16px; margin-top: 24px; padding-bottom: 0.3em;&quot;&gt;
&lt;a aria-hidden=&quot;true&quot; class=&quot;anchor&quot; href=&quot;https://github.com/segofensiva/OSfooler-ng#active-fingerprinting-nmap&quot; id=&quot;user-content-active-fingerprinting-nmap&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; float: left; line-height: 1; margin-left: -20px; padding-right: 4px; text-decoration-line: none;&quot;&gt;&lt;svg aria-hidden=&quot;true&quot; class=&quot;octicon octicon-link&quot; height=&quot;16&quot; version=&quot;1.1&quot; viewbox=&quot;0 0 16 16&quot; width=&quot;16&quot;&gt;&lt;path d=&quot;M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z&quot; fill-rule=&quot;evenodd&quot;&gt;&lt;/path&gt;&lt;/svg&gt;&lt;/a&gt;Active Fingerprinting: nmap&lt;/h2&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
To get the full list of OS to emulate, just use the flag &#39;-n&#39;:&lt;/div&gt;
&lt;pre style=&quot;background-color: #f6f8fa; border-radius: 3px; box-sizing: border-box; color: #24292e; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: 1.45; margin-bottom: 16px; overflow-wrap: normal; overflow: auto; padding: 16px;&quot;&gt;&lt;code style=&quot;background: transparent; border-radius: 3px; border: 0px; box-sizing: border-box; display: inline; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: inherit; margin: 0px; overflow-wrap: normal; overflow: visible; padding: 0px; word-break: normal;&quot;&gt;$ osfooler-ng -n
 [+] Please, select nmap OS to emulate
    + &quot;2N Helios IP VoIP doorbell&quot;
    + &quot;2Wire BT2700HG-V ADSL modem&quot;
    + &quot;2Wire 1701HG wireless ADSL modem&quot;
    [...]
    + &quot;ZyXEL Prestige 660HW-61 ADSL router (ZyNOS 3.40)&quot;
    + &quot;ZyXEL Prestige 660HW-D1 wireless ADSL router&quot;
    + &quot;ZyXEL ZyWALL 2 Plus firewall&quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
To emulate an specific OS, just use the flag &#39;-o&#39; with the OS you want to emulate:&lt;/div&gt;
&lt;pre style=&quot;background-color: #f6f8fa; border-radius: 3px; box-sizing: border-box; color: #24292e; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: 1.45; margin-bottom: 16px; overflow-wrap: normal; overflow: auto; padding: 16px;&quot;&gt;&lt;code style=&quot;background: transparent; border-radius: 3px; border: 0px; box-sizing: border-box; display: inline; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: inherit; margin: 0px; overflow-wrap: normal; overflow: visible; padding: 0px; word-break: normal;&quot;&gt;$ osfooler-ng -m &quot;Sony Ericsson W705 or W715 Walkman mobile phone&quot;
 [+] Mutating to nmap:
      Fingerprint Sony Ericsson W705 or W715 Walkman mobile phone
      Class Sony Ericsson | embedded || phone
      CPE cpe:/h:sonyericsson:w705
      CPE cpe:/h:sonyericsson:w715
      SEQ(CI=RD%II=I)
      OPS(R=N)
      WIN(R=N)
      ECN(R=N)
      T1(R=N)
      T2(R=Y%DF=N%T=3B-45%TG=40%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)
      T3(R=N)
      T4(R=Y%DF=N%T=3B-45%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
      T5(R=Y%DF=N%T=3B-45%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
      T6(R=Y%DF=N%T=3B-45%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
      T7(R=Y%DF=N%T=3B-45%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
      U1(DF=N%T=3B-45%TG=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
      IE(DFI=N%T=3B-45%TG=40%CD=S)
 [+] Activating queues
      [-&amp;gt;] Process-1: nmap packet processor
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 style=&quot;background-color: white; border-bottom: 1px solid rgb(234, 236, 239); box-sizing: border-box; color: #24292e; line-height: 1.25; margin-bottom: 16px; margin-top: 24px; padding-bottom: 0.3em;&quot;&gt;
&lt;a aria-hidden=&quot;true&quot; class=&quot;anchor&quot; href=&quot;https://github.com/segofensiva/OSfooler-ng#passive-fingerprinting-p0f-v2&quot; id=&quot;user-content-passive-fingerprinting-p0f-v2&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; float: left; line-height: 1; margin-left: -20px; padding-right: 4px; text-decoration-line: none;&quot;&gt;&lt;svg aria-hidden=&quot;true&quot; class=&quot;octicon octicon-link&quot; height=&quot;16&quot; version=&quot;1.1&quot; viewbox=&quot;0 0 16 16&quot; width=&quot;16&quot;&gt;&lt;path d=&quot;M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z&quot; fill-rule=&quot;evenodd&quot;&gt;&lt;/path&gt;&lt;/svg&gt;&lt;/a&gt;Passive Fingerprinting: p0f v2&lt;/h2&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
To get the full list of OS to emulate, just use the flag &#39;-l&#39;:&lt;/div&gt;
&lt;pre style=&quot;background-color: #f6f8fa; border-radius: 3px; box-sizing: border-box; color: #24292e; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: 1.45; margin-bottom: 16px; overflow-wrap: normal; overflow: auto; padding: 16px;&quot;&gt;&lt;code style=&quot;background: transparent; border-radius: 3px; border: 0px; box-sizing: border-box; display: inline; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: inherit; margin: 0px; overflow-wrap: normal; overflow: visible; padding: 0px; word-break: normal;&quot;&gt;$ osfooler-ng -p 
Please, select p0f OS Genre and Details
        OS Genre=&quot;AIX&quot; Details=&quot;4.3&quot;
        OS Genre=&quot;AIX&quot; Details=&quot;4.3.2 and earlier&quot;
        OS Genre=&quot;AIX&quot; Details=&quot;4.3.3-5.2 (1)&quot;
        [...]
        OS Genre=&quot;-*NMAP&quot; Details=&quot;OS detection probe w/flags (3)&quot;
        OS Genre=&quot;-*NMAP&quot; Details=&quot;OS detection probe w/flags (4)&quot;
        OS Genre=&quot;-*NAST&quot; Details=&quot;syn scan&quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
To emulate any p0f OS, just use the flag &#39;-o&#39; with the OS Genre. This will choose the main OS and custom version will be randomly loaded when a SYN packet is detected. For example:&lt;/div&gt;
&lt;pre style=&quot;background-color: #f6f8fa; border-radius: 3px; box-sizing: border-box; color: #24292e; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: 1.45; margin-bottom: 16px; overflow-wrap: normal; overflow: auto; padding: 16px;&quot;&gt;&lt;code style=&quot;background: transparent; border-radius: 3px; border: 0px; box-sizing: border-box; display: inline; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: inherit; margin: 0px; overflow-wrap: normal; overflow: visible; padding: 0px; word-break: normal;&quot;&gt;$ osfooler-ng -o &quot;PalmOS&quot;
 [+] Mutating to p0f:
      WWW:S9|TTL:255|D:0|SS:44|OOO:M536|QQ:.|OS:PalmOS|DETAILS:Tungsten T3/C
      WWW:S5|TTL:255|D:0|SS:44|OOO:M536|QQ:.|OS:PalmOS|DETAILS:3/4
      WWW:S4|TTL:255|D:0|SS:44|OOO:M536|QQ:.|OS:PalmOS|DETAILS:3.5
      WWW:2948|TTL:255|D:0|SS:44|OOO:M536|QQ:.|OS:PalmOS|DETAILS:3.5.3 (Handera)
      WWW:S29|TTL:255|D:0|SS:44|OOO:M536|QQ:.|OS:PalmOS|DETAILS:5.0
      WWW:16384|TTL:255|D:0|SS:44|OOO:M1398|QQ:.|OS:PalmOS|DETAILS:5.2 (Clie)
      WWW:S14|TTL:255|D:0|SS:44|OOO:M1350|QQ:.|OS:PalmOS|DETAILS:5.2.1 (Treo)
      WWW:16384|TTL:255|D:0|SS:44|OOO:M1400|QQ:.|OS:PalmOS|DETAILS:5.2 (Sony)
 [+] Activating queues
      [-&amp;gt;] Process-1: p0f packet processor
&lt;/code&gt;&lt;/pre&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
You can also emulate the full p0f OS, using &#39;-&#39; with the OS Genre and &#39;-d&#39; with custom details:&lt;/div&gt;
&lt;pre style=&quot;background-color: #f6f8fa; border-radius: 3px; box-sizing: border-box; color: #24292e; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: 1.45; margin-bottom: 16px; overflow-wrap: normal; overflow: auto; padding: 16px;&quot;&gt;&lt;code style=&quot;background: transparent; border-radius: 3px; border: 0px; box-sizing: border-box; display: inline; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: inherit; margin: 0px; overflow-wrap: normal; overflow: visible; padding: 0px; word-break: normal;&quot;&gt;$ osfooler-ng -o &quot;Windows&quot; -d &quot;XP bare-bone&quot;
 [+] Mutating to p0f:
     WWW:65520|TTL:128|D:1|SS:48|OOO:M*,N,N,S|QQ:.|OS:Windows|DETAILS:XP bare-bone
[+] Activating queues
     [-&amp;gt;] Process-1: p0f packet processor
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 style=&quot;background-color: white; border-bottom: 1px solid rgb(234, 236, 239); box-sizing: border-box; color: #24292e; line-height: 1.25; margin-bottom: 16px; margin-top: 24px; padding-bottom: 0.3em;&quot;&gt;
&lt;a aria-hidden=&quot;true&quot; class=&quot;anchor&quot; href=&quot;https://github.com/segofensiva/OSfooler-ng#active-and-passive-fingerprinting-nmap--p0f&quot; id=&quot;user-content-active-and-passive-fingerprinting-nmap--p0f&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; float: left; line-height: 1; margin-left: -20px; padding-right: 4px; text-decoration-line: none;&quot;&gt;&lt;svg aria-hidden=&quot;true&quot; class=&quot;octicon octicon-link&quot; height=&quot;16&quot; version=&quot;1.1&quot; viewbox=&quot;0 0 16 16&quot; width=&quot;16&quot;&gt;&lt;path d=&quot;M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z&quot; fill-rule=&quot;evenodd&quot;&gt;&lt;/path&gt;&lt;/svg&gt;&lt;/a&gt;Active and Passive Fingerprinting: nmap &amp;amp; p0f&lt;/h2&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
OSfooler-ng is also capable os emulating both OS to defeat nmap and p0f. Just combine the parameters above:&lt;/div&gt;
&lt;pre style=&quot;background-color: #f6f8fa; border-radius: 3px; box-sizing: border-box; color: #24292e; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: 1.45; margin-bottom: 16px; overflow-wrap: normal; overflow: auto; padding: 16px;&quot;&gt;&lt;code style=&quot;background: transparent; border-radius: 3px; border: 0px; box-sizing: border-box; display: inline; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: inherit; margin: 0px; overflow-wrap: normal; overflow: visible; padding: 0px; word-break: normal;&quot;&gt;$ osfooler-ng -m &quot;Microsoft Windows 2000 SP4&quot; -o &quot;Windows&quot; -d &quot;2000 SP4&quot;
 [+] Mutating to nmap:
      Fingerprint Microsoft Windows 2000 SP4
      Class Microsoft | Windows | 2000 | general purpose
      CPE cpe:/o:microsoft:windows_2000::sp4
      SEQ(SP=7C-86%GCD=1-6%ISR=95-9F%TI=I%II=I%SS=O|S%TS=0)
      OPS(O1=NNT11|M5B4NW0NNT00NNS%O2=NNT11|M5B4NW0NNT00NNS%O3=NNT11|M5B4NW0NNT00%O4=NNT11|M5B4NW0NNT00NNS%O5=NNT11|M5B4NW0NNT00NNS%O6=NNT11|M5B4NNT00NNS)
      WIN(W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FFFF)
      ECN(R=Y%DF=N%T=7B-85%TG=80%W=0%O=%CC=N%Q=U)
      T1(R=Y%DF=Y%T=7B-85%TG=80%S=O%A=O|S+%F=A|AS%RD=0%Q=|U)
      T2(R=Y%DF=N%T=7B-85%TG=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=U)
      T3(R=Y%DF=N%T=7B-85%TG=80%W=0%S=Z%A=O%F=AR%O=%RD=0%Q=U)
      T4(R=Y%DF=N%T=7B-85%TG=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=U)
      T5(R=Y%DF=N%T=7B-85%TG=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=U)
      T6(R=Y%DF=N%T=7B-85%TG=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=U)
      T7(R=Y%DF=N%T=7B-85%TG=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=U)
      U1(DF=N%T=7B-85%TG=80%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
      IE(DFI=S%T=7B-85%TG=80%CD=Z)
 [+] Mutating to p0f:
      WWW:40320|TTL:128|D:1|SS:48|OOO:M*,N,N,S|QQ:.|OS:Windows|DETAILS:2000 SP4
 [+] Activating queues
      [-&amp;gt;] Process-1: nmap packet processor
      [-&amp;gt;] Process-2: p0f packet processor
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 style=&quot;background-color: white; border-bottom: 1px solid rgb(234, 236, 239); box-sizing: border-box; color: #24292e; line-height: 1.25; margin-bottom: 16px; margin-top: 24px; padding-bottom: 0.3em;&quot;&gt;
&lt;a aria-hidden=&quot;true&quot; class=&quot;anchor&quot; href=&quot;https://github.com/segofensiva/OSfooler-ng#searching-for-operating-systems&quot; id=&quot;user-content-searching-for-operating-systems&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; float: left; line-height: 1; margin-left: -20px; padding-right: 4px; text-decoration-line: none;&quot;&gt;&lt;svg aria-hidden=&quot;true&quot; class=&quot;octicon octicon-link&quot; height=&quot;16&quot; version=&quot;1.1&quot; viewbox=&quot;0 0 16 16&quot; width=&quot;16&quot;&gt;&lt;path d=&quot;M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z&quot; fill-rule=&quot;evenodd&quot;&gt;&lt;/path&gt;&lt;/svg&gt;&lt;/a&gt;Searching for Operating Systems&lt;/h2&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
You can search inside nmap/p0f database for a specific OS, instead of getting the whole list. Just use the flag &#39;-s&#39; and enter the keyword you want to search for (case insensitive). You&#39;ll get any match found, and if it belongs to nmap or p0f databases:&lt;/div&gt;
&lt;pre style=&quot;background-color: #f6f8fa; border-radius: 3px; box-sizing: border-box; color: #24292e; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: 1.45; margin-bottom: 16px; overflow-wrap: normal; overflow: auto; padding: 16px;&quot;&gt;&lt;code style=&quot;background: transparent; border-radius: 3px; border: 0px; box-sizing: border-box; display: inline; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: inherit; margin: 0px; overflow-wrap: normal; overflow: visible; padding: 0px; word-break: normal;&quot;&gt;$ osfooler-ng -s playstation
 [+] Searching databases for: &#39;playstation&#39;
      [nmap] &quot;Sony Playstation 4 or FreeBSD 10.2-RELEASE&quot;
      [nmap] &quot;Sony PlayStation 2 game console test kit 2.2.1&quot;
      [nmap] &quot;Sony PlayStation 3 game console&quot;
      [nmap] &quot;Sony PlayStation 3 game console test kit&quot;
      [nmap] &quot;Sony PlayStation 2 game console&quot;
      [p0f] OS: &quot;Sony&quot; DETAILS: &quot;Playstation 2 (SOCOM?)&quot;
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 style=&quot;background-color: white; border-bottom: 1px solid rgb(234, 236, 239); box-sizing: border-box; color: #24292e; line-height: 1.25; margin-bottom: 16px; margin-top: 24px; padding-bottom: 0.3em;&quot;&gt;
&lt;a aria-hidden=&quot;true&quot; class=&quot;anchor&quot; href=&quot;https://github.com/segofensiva/OSfooler-ng#update-nmap-database&quot; id=&quot;user-content-update-nmap-database&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; float: left; line-height: 1; margin-left: -20px; padding-right: 4px; text-decoration-line: none;&quot;&gt;&lt;svg aria-hidden=&quot;true&quot; class=&quot;octicon octicon-link&quot; height=&quot;16&quot; version=&quot;1.1&quot; viewbox=&quot;0 0 16 16&quot; width=&quot;16&quot;&gt;&lt;path d=&quot;M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z&quot; fill-rule=&quot;evenodd&quot;&gt;&lt;/path&gt;&lt;/svg&gt;&lt;/a&gt;Update nmap database&lt;/h2&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
Use the flag &#39;-u&#39; to check if there&#39;s a new version of nmap&#39;s database avaiable and to download it&lt;/div&gt;
&lt;pre style=&quot;background-color: #f6f8fa; border-radius: 3px; box-sizing: border-box; color: #24292e; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: 1.45; margin-bottom: 16px; overflow-wrap: normal; overflow: auto; padding: 16px;&quot;&gt;&lt;code style=&quot;background: transparent; border-radius: 3px; border: 0px; box-sizing: border-box; display: inline; font-family: SFMono-Regular, Consolas, &amp;quot;Liberation Mono&amp;quot;, Menlo, Courier, monospace; font-size: 13.6px; line-height: inherit; margin: 0px; overflow-wrap: normal; overflow: visible; padding: 0px; word-break: normal;&quot;&gt;$ osfooler-ng -u
 [+] Checking nmap database... latest!
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 style=&quot;background-color: white; border-bottom: 1px solid rgb(234, 236, 239); box-sizing: border-box; color: #24292e; line-height: 1.25; margin-bottom: 16px; margin-top: 24px; padding-bottom: 0.3em;&quot;&gt;
&lt;a aria-hidden=&quot;true&quot; class=&quot;anchor&quot; href=&quot;https://github.com/segofensiva/OSfooler-ng#custom-flags&quot; id=&quot;user-content-custom-flags&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; float: left; line-height: 1; margin-left: -20px; padding-right: 4px; text-decoration-line: none;&quot;&gt;&lt;svg aria-hidden=&quot;true&quot; class=&quot;octicon octicon-link&quot; height=&quot;16&quot; version=&quot;1.1&quot; viewbox=&quot;0 0 16 16&quot; width=&quot;16&quot;&gt;&lt;path d=&quot;M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z&quot; fill-rule=&quot;evenodd&quot;&gt;&lt;/path&gt;&lt;/svg&gt;&lt;/a&gt;Custom flags&lt;/h2&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
There are other interesting flags:&lt;/div&gt;
&lt;ul style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px; margin-top: 0px; padding-left: 2em;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&#39;-v&#39;: Show info about every modified packet&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em;&quot;&gt;&#39;-i &#39;: Choose network interface (eth0 by default)&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em;&quot;&gt;&#39;-V&#39;: Show OSfooler-ng banner and current version installed&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 style=&quot;background-color: white; border-bottom: 1px solid rgb(234, 236, 239); box-sizing: border-box; color: #24292e; line-height: 1.25; margin: 24px 0px 16px; padding-bottom: 0.3em;&quot;&gt;
&lt;a aria-hidden=&quot;true&quot; class=&quot;anchor&quot; href=&quot;https://github.com/segofensiva/OSfooler-ng#authors&quot; id=&quot;user-content-authors&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; float: left; line-height: 1; margin-left: -20px; padding-right: 4px; text-decoration-line: none;&quot;&gt;&lt;svg aria-hidden=&quot;true&quot; class=&quot;octicon octicon-link&quot; height=&quot;16&quot; version=&quot;1.1&quot; viewbox=&quot;0 0 16 16&quot; width=&quot;16&quot;&gt;&lt;path d=&quot;M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z&quot; fill-rule=&quot;evenodd&quot;&gt;&lt;/path&gt;&lt;/svg&gt;&lt;/a&gt;Authors&lt;/h1&gt;
&lt;ul style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px; margin-top: 0px; padding-left: 2em;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;span style=&quot;box-sizing: border-box; font-weight: 600;&quot;&gt;&lt;a href=&quot;https://www.seguridadofensiva.com/&quot; rel=&quot;nofollow&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; text-decoration-line: none;&quot;&gt;Jaime Sánchez&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://twitter.com/segofensiva&quot; rel=&quot;nofollow&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; text-decoration-line: none;&quot;&gt;@segofensiva)&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 style=&quot;background-color: white; border-bottom: 1px solid rgb(234, 236, 239); box-sizing: border-box; color: #24292e; line-height: 1.25; margin: 24px 0px 16px; padding-bottom: 0.3em;&quot;&gt;
&lt;a aria-hidden=&quot;true&quot; class=&quot;anchor&quot; href=&quot;https://github.com/segofensiva/OSfooler-ng#license&quot; id=&quot;user-content-license&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; float: left; line-height: 1; margin-left: -20px; padding-right: 4px; text-decoration-line: none;&quot;&gt;&lt;svg aria-hidden=&quot;true&quot; class=&quot;octicon octicon-link&quot; height=&quot;16&quot; version=&quot;1.1&quot; viewbox=&quot;0 0 16 16&quot; width=&quot;16&quot;&gt;&lt;path d=&quot;M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z&quot; fill-rule=&quot;evenodd&quot;&gt;&lt;/path&gt;&lt;/svg&gt;&lt;/a&gt;License&lt;/h1&gt;
&lt;div style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 16px;&quot;&gt;
This project is licensed under the The&amp;nbsp;&lt;span style=&quot;box-sizing: border-box; font-weight: 600;&quot;&gt;GNU General Public License v3.0&lt;/span&gt;&amp;nbsp;- see the&amp;nbsp;&lt;a href=&quot;https://github.com/segofensiva/OSfooler-ng/blob/master/LICENSE.md&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; text-decoration-line: none;&quot;&gt;LICENSE.md&lt;/a&gt;&amp;nbsp;file for details&lt;/div&gt;
&lt;h1 style=&quot;background-color: white; border-bottom: 1px solid rgb(234, 236, 239); box-sizing: border-box; color: #24292e; line-height: 1.25; margin: 24px 0px 16px; padding-bottom: 0.3em;&quot;&gt;
&lt;a aria-hidden=&quot;true&quot; class=&quot;anchor&quot; href=&quot;https://github.com/segofensiva/OSfooler-ng#acknowledgments&quot; id=&quot;user-content-acknowledgments&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; float: left; line-height: 1; margin-left: -20px; padding-right: 4px; text-decoration-line: none;&quot;&gt;&lt;svg aria-hidden=&quot;true&quot; class=&quot;octicon octicon-link&quot; height=&quot;16&quot; version=&quot;1.1&quot; viewbox=&quot;0 0 16 16&quot; width=&quot;16&quot;&gt;&lt;path d=&quot;M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z&quot; fill-rule=&quot;evenodd&quot;&gt;&lt;/path&gt;&lt;/svg&gt;&lt;/a&gt;Acknowledgments&lt;/h1&gt;
&lt;ul style=&quot;background-color: white; box-sizing: border-box; color: #24292e; margin-bottom: 0px !important; margin-top: 0px; padding-left: 2em;&quot;&gt;
&lt;li style=&quot;box-sizing: border-box;&quot;&gt;&lt;a href=&quot;https://defcon.org/html/dc-china-1/dc-cn-1-index.html&quot; rel=&quot;nofollow&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; text-decoration-line: none;&quot;&gt;Defcon China&lt;/a&gt;, for leting me show this tool on&amp;nbsp;&lt;a href=&quot;https://defcon.org/html/dc-china-1/dc-cn-1-demolabs.html#segofensiva&quot; rel=&quot;nofollow&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; text-decoration-line: none;&quot;&gt;Demo Labs&lt;/a&gt;&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em;&quot;&gt;All those people who have worked and released software on OS fingerprinting (attack and defense), specially&amp;nbsp;&lt;a href=&quot;https://nmap.org/&quot; rel=&quot;nofollow&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; text-decoration-line: none;&quot;&gt;nmap&lt;/a&gt;&amp;nbsp;&amp;amp;&amp;nbsp;&lt;a href=&quot;https://github.com/segofensiva/OSfooler-ng/blob/master/lcamtuf.coredump.cx&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; text-decoration-line: none;&quot;&gt;p0f&lt;/a&gt;, but also Xprobe, IP Personality etc.&lt;/li&gt;
&lt;li style=&quot;box-sizing: border-box; margin-top: 0.25em;&quot;&gt;OSfooler-ng makes use of the&amp;nbsp;&lt;a href=&quot;https://scapy.net/&quot; rel=&quot;nofollow&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; text-decoration-line: none;&quot;&gt;Scapy Project&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;https://netfilter.org/projects/libnetfilter_queue/&quot; rel=&quot;nofollow&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: #0366d6; text-decoration-line: none;&quot;&gt;The netfilter.org &quot;libnetfilter_queue&quot; project&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/8071930456050084911/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2019/05/osfooler-ng-v1.0-released.html#comment-form' title='1 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/8071930456050084911'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/8071930456050084911'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2019/05/osfooler-ng-v1.0-released.html' title='OSfooler-ng v1.0 released'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcJoD4j2yVn-X3b7H_WbCwRXFwMuvSwFqjsejVWa9QatOWWKXOd21yUxjuzRTRwi0RiC_ypP9Jsc1FJq7KJ4NjgTbmRQxCmerpKuKTy5Kgu3bj2xDA1ZXMSYXemLyZ1DZl78DO5WzXKF_t/s72-c/268497.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-5264005916063763332</id><published>2019-05-06T04:16:00.002-07:00</published><updated>2019-06-19T08:32:02.467-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="Defcon"/><category scheme="http://www.blogger.com/atom/ns#" term="Herramientas"/><category scheme="http://www.blogger.com/atom/ns#" term="OSfooler"/><title type='text'>Next Stop, Defcon China: Derevolutionizing OS Fingerprinting: The cat and mouse game (slides)</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5n6UBGSwe2LvBmjsIgKrdmlIOlEzzeR9YnU_aU165lNBm6dvw5eojE_W7QSemKMdzwZ00zv4f7DJ0zvqVyOA-ybWFtnYi89Bc1hCSFxjWCYMpWu8NahAnetA1MxYkrK3PH2B9YOK3ACqV/s1600/D535H66W0AALZIA.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;774&quot; data-original-width=&quot;1322&quot; height=&quot;374&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5n6UBGSwe2LvBmjsIgKrdmlIOlEzzeR9YnU_aU165lNBm6dvw5eojE_W7QSemKMdzwZ00zv4f7DJ0zvqVyOA-ybWFtnYi89Bc1hCSFxjWCYMpWu8NahAnetA1MxYkrK3PH2B9YOK3ACqV/s640/D535H66W0AALZIA.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Great news!! I will be speaking at &lt;a href=&quot;https://www.defcon.org/html/dc-china-1/dc-cn-1-index.html&quot; target=&quot;_blank&quot;&gt;Defcon China&lt;/a&gt; (31 May - 02) about “&lt;a href=&quot;https://www.defcon.org/html/dc-china-1/dc-cn-1-speakers.html#Sanchez&quot; target=&quot;_blank&quot;&gt;Derevolutionizing OS Fingerprinting: The Cat and Mouse Game&lt;/a&gt;”.&lt;br /&gt;
&lt;br /&gt;
With the explosive growth and distributed nature of computer networks, it has become progressively more difficult to manage, secure, and identify Internet devices. An outsider has the capability to discover general information, such as which operating system a host is running, by searching for default stack parameters, ambiguities in IETF RFCs or non-compliant TCP/IP implementations in responses to malformed requests. By pinpointing the exact OS of a host, an attacker can launch an educated and precise attack against a target machine.
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
There are lot of reasons to hide your OS to the entire world:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Revealing your OS makes things easier to find and successfully run an exploit against any of your devices.&lt;/li&gt;
&lt;li&gt;Having and unpatched or antique OS version is not very convenient for your company prestige. Imagine that your company is a bank and some users notice that you are running an unpatched box. They won&#39;t trust you any longer! In addition, these kind of &#39;bad&#39; news are always sent to the public opinion.&lt;/li&gt;
&lt;li&gt;Knowing your OS can also become more dangerous, because people can guess which applications are you running in that OS (data inference). For example if your system is a MS Windows, and you are running a database, it&#39;s highly likely that you are running MS-SQL.&lt;/li&gt;
&lt;li&gt;It could be convenient for other software companies, to offer you a new OS environment (because they know which you are running).&lt;/li&gt;
&lt;li&gt;And finally, privacy; nobody needs to know the systems you&#39;ve got running.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
This talk aims to present well-known methods that perform classification using application-layer traffic (TCP/IP/UDP headers, ICMP packets, or some combination thereof), old style approaches to defeat remote OS fingerprinting (like tweaking Windows registry or implement patches to the Linux kernel) and why this doesn&#39;t work with nowadays and could affect TCP/IP stack performance.&lt;br /&gt;
&lt;br /&gt;
I&#39;ll also present a new approach to detect and defeat both active/passive OS fingerprint with OSfooler-NG, a completely rewritten tool, highly portable, completely undetectable for the attackers and capable of detecting and defeating famous tools like &lt;a href=&quot;https://nmap.org/&quot; target=&quot;_blank&quot;&gt;nmap&lt;/a&gt;, &lt;a href=&quot;http://lcamtuf.coredump.cx/p0f3/#&quot; target=&quot;_blank&quot;&gt;p0f&lt;/a&gt;, &lt;a href=&quot;https://ofirarkin.wordpress.com/xprobe/&quot; target=&quot;_blank&quot;&gt;Xprobe&lt;/a&gt;, &lt;a href=&quot;https://www.pfsense.org/&quot; target=&quot;_blank&quot;&gt;pfsense&lt;/a&gt; and many commercial engines:&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;iframe src=&quot;//www.slideshare.net/slideshow/embed_code/key/nidb9LJO2vjdKU&quot; width=&quot;595&quot; height=&quot;485&quot; frameborder=&quot;0&quot; marginwidth=&quot;0&quot; marginheight=&quot;0&quot; scrolling=&quot;no&quot; style=&quot;border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;&quot; allowfullscreen&gt; &lt;/iframe&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
Sorry guys, OS fingerprinting is over ...&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/5264005916063763332/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2019/05/next-stop-defcon-china.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/5264005916063763332'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/5264005916063763332'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2019/05/next-stop-defcon-china.html' title='Next Stop, Defcon China: Derevolutionizing OS Fingerprinting: The cat and mouse game (slides)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5n6UBGSwe2LvBmjsIgKrdmlIOlEzzeR9YnU_aU165lNBm6dvw5eojE_W7QSemKMdzwZ00zv4f7DJ0zvqVyOA-ybWFtnYi89Bc1hCSFxjWCYMpWu8NahAnetA1MxYkrK3PH2B9YOK3ACqV/s72-c/D535H66W0AALZIA.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-649746917809837796</id><published>2019-04-22T12:05:00.000-07:00</published><updated>2019-05-06T04:18:36.142-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2080ti"/><category scheme="http://www.blogger.com/atom/ns#" term="hashcat"/><category scheme="http://www.blogger.com/atom/ns#" term="Herramientas"/><category scheme="http://www.blogger.com/atom/ns#" term="Kaonashi"/><category scheme="http://www.blogger.com/atom/ns#" term="password cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentesting"/><title type='text'>Kratos (una historia de Password Cracking): especificaciones técnicas y montaje</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6T5Yn71fdoYzzX2-oqJF0gywNz9SgMKh3mxh8rq4Fp2Pc2JrmNnVc243KwdDh5SN0QCUuABTrV6UseN0detS2MtLK_-fvymwOKGKrD_-dy8VhebA8ivj5bYinmiujKz8qh3hFogdV3KMD/s1600/B38895D8-AA42-4D12-B0DF-57583B3B2F38.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1600&quot; data-original-width=&quot;1600&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6T5Yn71fdoYzzX2-oqJF0gywNz9SgMKh3mxh8rq4Fp2Pc2JrmNnVc243KwdDh5SN0QCUuABTrV6UseN0detS2MtLK_-fvymwOKGKrD_-dy8VhebA8ivj5bYinmiujKz8qh3hFogdV3KMD/s640/B38895D8-AA42-4D12-B0DF-57583B3B2F38.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Desde hace ya muchos años, he pasado la mayoría de mis días hackeando sistemas, investigando servicios / aplicaciones / protocolos o creando nuevas herramientas. Como parte de este trabajo, descifrar hashes es algo con lo que he tenido que enfrentarme frecuentemente. Sé que hoy en día es sencillo alquilar una instancia en la nube con varias GPUs, pero cuanto más avanzábamos en nuestra charla de &lt;a href=&quot;https://www.seguridadofensiva.com/2019/04/slides-disponibles-de-i-know-your-password-rooted-2019.html&quot; target=&quot;_blank&quot;&gt;Kaonashi&lt;/a&gt;, más me daba cuenta de que necesitaba acceso casi constante, por lo que decidí montarme mi propio sistema.&lt;br /&gt;
&lt;br /&gt;
Esta es la historia de &lt;b&gt;Kratos&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Una de las decisiones a las que tienes que enfrentarte al montar estos sistemas es el tipo de ventilación que se va a utilizar, donde tenemos dos opciones: refrigeración líquida o un buen flujo de aire utilizando ventiladores. A pesar de que es más una decisión personal, prefiero mantener un buen flujo de aire en la caja del equipo y me siento más tranquilo sabiendo que una posible fuga de líquido no acabará dañando las piezas :)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
Aprovechando que Roma pasa por Santiago, opte por unas especificaciones técnicas más completas y poder utilizar el equipo para otras tareas que requirieran de algo de potencia. También he incluido ventilación adicional. y un SAI que proteja el equipo frente a posibles picos de tensión o apagones (más vale prevenir que curar).&lt;br /&gt;
&lt;br /&gt;
La configuración final quedó así:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.intel.la/content/www/xl/es/products/processors/core/i9-processors/i9-9900k.html&quot; target=&quot;_blank&quot;&gt;Intel i9 9900k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.asus.com/es/Graphics-Cards/TURBO-RTX2080TI-11G/&quot; target=&quot;_blank&quot;&gt;Asus RTX 2080ti&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.corsair.com/es/es/Categor%C3%ADas/Productos/Unidades-de-fuentes-de-alimentaci%C3%B3n/Unidades-de-fuentes-de-alimentaci%C3%B3n-avanzadas/RMx-Series/p/CP-9020094-EU&quot; target=&quot;_blank&quot;&gt;Corsair RM1000x&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.samsung.com/es/memory-storage/ssd-970-evo/MZ-V7E250BW/&quot; target=&quot;_blank&quot;&gt;Samsung 970 EVO NVMe&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.corsair.com/es/es/Categor%C3%ADas/Productos/Memoria/vengeance-lpx-black/p/CMK32GX4M2B3200C16&quot; target=&quot;_blank&quot;&gt;Corsair Vengeance LPX 4 x 16 GB, DDR4, 2400 MHz&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://es.thermaltake.com/products-model.aspx?id=C_00002559&quot; target=&quot;_blank&quot;&gt;Thermaltake Core V21&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://noctua.at/es/nh-u14s&quot; target=&quot;_blank&quot;&gt;Noctua NH-U14S&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.apc.com/shop/es/es/products/APC-Back-UPS-1400VA-230V-AVR-IEC-Sockets/P-BX1400UI&quot; target=&quot;_blank&quot;&gt;APC Back-UPS BX 1400VA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.msi.com/Motherboard/mpg-z390m-gaming-edge-ac&quot; target=&quot;_blank&quot;&gt;MSI MPG z390m Gaming Edge AC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.corsair.com/es/es/Categor%C3%ADas/Productos/Ventiladores/ml-pro-led-config/p/CO-9050046-WW&quot; target=&quot;_blank&quot;&gt;Corsair ML140&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;h3&gt;
&lt;/h3&gt;
&lt;h3&gt;
&amp;nbsp;&lt;/h3&gt;
&lt;h3&gt;
Montaje&lt;/h3&gt;
Trabajar con una carcasa mATX como la Thermaltake Core V21 a veces puede ser complicado por los temas de espacio, pero realmente merece la pena cuando has acabado, ya que consigues un equipo compacto, con buena ventilación y con un tamaño reducido. Comenzamos desmontando las diferentes tapas de la caja, e instalando la fuente de alimentación del sistema con el ventilador orientado hacia abajo, de tal forma que podamos expulsar directamente el calor generado por ésta:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyp6xF-NkwqFucxirJTRdt7G4shCFvm8BXqvTI3fQySNKWA69fDBaLKjGczdFTg-zrhVkRI3aN8LzKpOkHPH1VYBPm8v9YCWyv3Ir6K1TkN2RnNlm4ebcKyyFrLFMnkFXsFe8DiLf1VORs/s1600/IMG_8409.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyp6xF-NkwqFucxirJTRdt7G4shCFvm8BXqvTI3fQySNKWA69fDBaLKjGczdFTg-zrhVkRI3aN8LzKpOkHPH1VYBPm8v9YCWyv3Ir6K1TkN2RnNlm4ebcKyyFrLFMnkFXsFe8DiLf1VORs/s200/IMG_8409.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUVJo3nXHUwwsSIVE1uYAGZwnl_dutISJCSkpB-8xtTSVVI9mtfqqw8RAskZmYksWNxy6yS9GZNAZZbJf9A05Gu4q2611KM4oBYQMBL5k-sQrZ2_ydHaON0i1lctjH1_7kJO4TLz8rKCD5/s1600/IMG_8410.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUVJo3nXHUwwsSIVE1uYAGZwnl_dutISJCSkpB-8xtTSVVI9mtfqqw8RAskZmYksWNxy6yS9GZNAZZbJf9A05Gu4q2611KM4oBYQMBL5k-sQrZ2_ydHaON0i1lctjH1_7kJO4TLz8rKCD5/s200/IMG_8410.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhazXb-yFTIn6dtxTBZnAJWqKMk2g5UMwMWHWaErRvwpY7o3QzPbKLxxw8oYwdsDCMg7CzjRtMFmI5gFzQvF5GrbnWUTdyoxeUX3FI3Zmu69g7AKJ2kfdLhkbFG5F0hvIfxDnnNUEfjLfje/s1600/IMG_8318.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhazXb-yFTIn6dtxTBZnAJWqKMk2g5UMwMWHWaErRvwpY7o3QzPbKLxxw8oYwdsDCMg7CzjRtMFmI5gFzQvF5GrbnWUTdyoxeUX3FI3Zmu69g7AKJ2kfdLhkbFG5F0hvIfxDnnNUEfjLfje/s200/IMG_8318.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg86_CeacDIDyH4ywyJ2ydd1nkaf2B2hA1MYm4R9GzB827hCPdEBg2u9fmQH8rcYjFPhCDr7yfAD3DrDRhUqaEU9Kf3e2MZwc8RNiBWOtGAnJ8NCvigI-zJM2Q_LEImBJbFSQG-4NJGMuPo/s1600/IMG_8319.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg86_CeacDIDyH4ywyJ2ydd1nkaf2B2hA1MYm4R9GzB827hCPdEBg2u9fmQH8rcYjFPhCDr7yfAD3DrDRhUqaEU9Kf3e2MZwc8RNiBWOtGAnJ8NCvigI-zJM2Q_LEImBJbFSQG-4NJGMuPo/s200/IMG_8319.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Ahora nos ponemos manos a la obra con la placa base, instalando con cuidado la CPU en el socket correspondiente, después de la sorpresa anterior con un &lt;a href=&quot;https://www.seguridadofensiva.com/2019/04/anatomy-of-intel-cpu-scam.html&quot; target=&quot;_blank&quot;&gt;intento de fraude con un i9&lt;/a&gt;. Debemos prestar atención a las muescas y los indicadores que vienen sobre el chipset, para alinearlo correctamente y no dañar ningún componente:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3fvd1tg21_ItgCuTu8rJkj_bjnDyEmwFsK81QjQjhuQNOej3ZJ6DdnoWM1V0JZFAvt9qx30xfl2zaWWGwMN0QJ3lwmKf9UVj_RQjsQM-C5rpTmNm3acHR-vLTW7u1mSeWmcSMi3n_KSq7/s1600/IMG_8380.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3fvd1tg21_ItgCuTu8rJkj_bjnDyEmwFsK81QjQjhuQNOej3ZJ6DdnoWM1V0JZFAvt9qx30xfl2zaWWGwMN0QJ3lwmKf9UVj_RQjsQM-C5rpTmNm3acHR-vLTW7u1mSeWmcSMi3n_KSq7/s200/IMG_8380.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_uMx3M9tcEqxrxmisohm-KePtSy4fxUGMMUbJASEEanAXo7vJ_fnBmUO8xiq1xN0qZkVgbbAEocrbCOaUorJM4UAcBaJ2NvFvNI8wGHXiRblvQJYEw6HceyL5TzlTRuzvJHzRCzvevUhj/s1600/IMG_8381.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_uMx3M9tcEqxrxmisohm-KePtSy4fxUGMMUbJASEEanAXo7vJ_fnBmUO8xiq1xN0qZkVgbbAEocrbCOaUorJM4UAcBaJ2NvFvNI8wGHXiRblvQJYEw6HceyL5TzlTRuzvJHzRCzvevUhj/s200/IMG_8381.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgITZzsR-SO0j0ysZ5RrDBl3Qm12K4qg7ZXb2HLWH4-c69GwdwYjuUPdM30nax4R-4MSiW8ZjJlb8gfzfIMzeRKfig4QnjD5dafJZeGUceQu5aRi0mK2Qa7RrdZKFDFGrnZKDTJMqOOAofC/s1600/IMG_8385.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgITZzsR-SO0j0ysZ5RrDBl3Qm12K4qg7ZXb2HLWH4-c69GwdwYjuUPdM30nax4R-4MSiW8ZjJlb8gfzfIMzeRKfig4QnjD5dafJZeGUceQu5aRi0mK2Qa7RrdZKFDFGrnZKDTJMqOOAofC/s200/IMG_8385.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgg6hXV23J4SFVSpG8f2h76nY0ub8NuovBQ3rQgajsO8LhstveSziPicab7JZMU9WkpEtkxPHPCVT9wFV_q70R4PtmVDEcb7s8JvkZ1mu6iS-4yLxss2EMUuEV4jDLtfmndPA5TUXRBoKbk/s1600/IMG_8387.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgg6hXV23J4SFVSpG8f2h76nY0ub8NuovBQ3rQgajsO8LhstveSziPicab7JZMU9WkpEtkxPHPCVT9wFV_q70R4PtmVDEcb7s8JvkZ1mu6iS-4yLxss2EMUuEV4jDLtfmndPA5TUXRBoKbk/s200/IMG_8387.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Instalamos los soportes inferiores y superiores del ventilador del procesador, y añadimos la memoria RAM, ya que si lo hacemos posteriormente lo tendremos más complicado por temas de espacio, ya que el disipador nos lo complicará:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGE2_AsZcGkjWC8eabfymjOUM8lq0sa9Gaa2vqfg_LqAsgzzEB7494Vhg7-YSXQlHpKztEO_7tVl7rDQ2RF0ImR1ScvOvvkFYUzKsav2guKBqZFyuiuQVdH4CIcPyW9-RvtMRz2gZLK6pv/s1600/IMG_8389.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGE2_AsZcGkjWC8eabfymjOUM8lq0sa9Gaa2vqfg_LqAsgzzEB7494Vhg7-YSXQlHpKztEO_7tVl7rDQ2RF0ImR1ScvOvvkFYUzKsav2guKBqZFyuiuQVdH4CIcPyW9-RvtMRz2gZLK6pv/s200/IMG_8389.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCBQhCghjUNG1EkaXoxja2jSkMJHWJUjPWp8dfrntKRpyXwh4aLuozjT8SZWQ4L_p_19MbCcHPORGlu7WqhEwUJI3tQBH99PwKxH0rLRBhURQisZ0_j-hoNAk5kKsfHqA-xiB7uS1m-u7g/s1600/IMG_8390.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCBQhCghjUNG1EkaXoxja2jSkMJHWJUjPWp8dfrntKRpyXwh4aLuozjT8SZWQ4L_p_19MbCcHPORGlu7WqhEwUJI3tQBH99PwKxH0rLRBhURQisZ0_j-hoNAk5kKsfHqA-xiB7uS1m-u7g/s200/IMG_8390.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRGnH-RVk4cnNV-djkFaAyT-zfjbqctY1uFsdy1ir2YpU3VuqJNK9naHqMo03Th6wiGmi-ZldsNqe0NQ78gQBg6jcNCQQKtviVRct-O1xB6IKpcjdSG8VSZ_-wm1-usgPGuZ9WSGI0_ivW/s1600/IMG_8401.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRGnH-RVk4cnNV-djkFaAyT-zfjbqctY1uFsdy1ir2YpU3VuqJNK9naHqMo03Th6wiGmi-ZldsNqe0NQ78gQBg6jcNCQQKtviVRct-O1xB6IKpcjdSG8VSZ_-wm1-usgPGuZ9WSGI0_ivW/s200/IMG_8401.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheA1oZM4osRi64xfUOLoDF1pZh7luyfO9Old6pYWVG2zQdEf5fmKHONpOjx_pqik3gq-wdaf-1u5rwHLNAxd_MXH6yKnuyb9fPZlWSD49K-P4MKLkfMqFfrmNGfHjJNrSW4g-FLoUtmYCK/s1600/IMG_8400.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheA1oZM4osRi64xfUOLoDF1pZh7luyfO9Old6pYWVG2zQdEf5fmKHONpOjx_pqik3gq-wdaf-1u5rwHLNAxd_MXH6yKnuyb9fPZlWSD49K-P4MKLkfMqFfrmNGfHjJNrSW4g-FLoUtmYCK/s200/IMG_8400.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span id=&quot;goog_657092183&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_657092184&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Por las características de este equipo, he decidido prescindir de los discos duros en formato 2.5 o 3.5, a pesar de que la caja permite el montaje de varios de cada tipo. Para reducir la cantidad de calor gestionado, he optado por un disco en formato NVMe como se aprecia a continuación:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyXAmdiHZVWmPxERU1P2pNVyjZmxZ5L3_5AaQHG4ZAXrqlqxoHFVRTiCkxaJXEDnWGETNsQ89AidRPdCF58qnNHR3bUdYRLTKevqlA_m7oF2fg2e_aKr7wbLK6o246uM4jkAwGgbEB_Pg0/s1600/IMG_8402.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyXAmdiHZVWmPxERU1P2pNVyjZmxZ5L3_5AaQHG4ZAXrqlqxoHFVRTiCkxaJXEDnWGETNsQ89AidRPdCF58qnNHR3bUdYRLTKevqlA_m7oF2fg2e_aKr7wbLK6o246uM4jkAwGgbEB_Pg0/s200/IMG_8402.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr6uyyv164Dei2ellUoPpa2fRv1rWRIyuq3Hdr42-ufJKQpDJoF376z0aX0hirI7h_-retta_s4foE9FhNWbMxesCmJbV7_XaaYOtzQ_Lsf4CoEPsDQ4garvPB5ehcrHpUIzj2iPaeapvc/s1600/IMG_8403.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr6uyyv164Dei2ellUoPpa2fRv1rWRIyuq3Hdr42-ufJKQpDJoF376z0aX0hirI7h_-retta_s4foE9FhNWbMxesCmJbV7_XaaYOtzQ_Lsf4CoEPsDQ4garvPB5ehcrHpUIzj2iPaeapvc/s200/IMG_8403.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Ahora es momento de montar disipador y ventilador de la CPU. Dependiendo de la caja que hayáis escogido, es posible que debáis orientar el ventilador hacia un lado u otro. En mi caso lo he orientado a uno de los laterales de la caja, ya que si ponía el disipador en perpendicular, no había espacio para instalar la primera RTX 2080ti y hacía contacto con el circuito, posiblemente creando cortos y estropeando el componente:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgojoYNF2hiTa0TO7H3pdZL0aCTmWm9oOlS95wSNMGcyn1dRLzuiSI8nJ7vn7Bsnm5jVQfrBvzA97mJG1AHlgIu77PhoyIfuqmbw5Z1QSW2uc_2NtSGMnacLLYZzekzu7Y2caSUdlHJVhmp/s1600/IMG_8405.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgojoYNF2hiTa0TO7H3pdZL0aCTmWm9oOlS95wSNMGcyn1dRLzuiSI8nJ7vn7Bsnm5jVQfrBvzA97mJG1AHlgIu77PhoyIfuqmbw5Z1QSW2uc_2NtSGMnacLLYZzekzu7Y2caSUdlHJVhmp/s200/IMG_8405.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYxna26mUIltG0KSflfW2_k9hQoCFhLvVv85lSeQMiD_HJoS_puTQGOeFoWiq8xot8D0Z5b8HODAiDMKkZUJX_wvvCh8qmMLyqdIGsCx-0se0kUmGqnAfBJhNvNcu-UoaXUatGc7CLyJ9Y/s1600/IMG_8406.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYxna26mUIltG0KSflfW2_k9hQoCFhLvVv85lSeQMiD_HJoS_puTQGOeFoWiq8xot8D0Z5b8HODAiDMKkZUJX_wvvCh8qmMLyqdIGsCx-0se0kUmGqnAfBJhNvNcu-UoaXUatGc7CLyJ9Y/s200/IMG_8406.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg85V10UpRlKBUdyy5VpMiaTQ2XZPPknJERMc-MBVZwP3VZWrmyK20bHCxEG1F8cpqPD9SWqZ1Rr5bcqbk6WpbENh000EN7iHs2ApZv5zg1Wscc6jExBYvJn67lavPCq4wanrxERadR_wsg/s1600/IMG_8407.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg85V10UpRlKBUdyy5VpMiaTQ2XZPPknJERMc-MBVZwP3VZWrmyK20bHCxEG1F8cpqPD9SWqZ1Rr5bcqbk6WpbENh000EN7iHs2ApZv5zg1Wscc6jExBYvJn67lavPCq4wanrxERadR_wsg/s200/IMG_8407.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC2NleprX-E8twEYdKG6B_VEchXzK3nISBMpeN02Zv9vDGoJd1WkfnJnlfxQu8oNbY_Q3YFB6wjm7cRmjfPhQiV-qg7-y16K9dsIAmm25Vrg6aPsvsURpU9M7uIPwJjRKYB1hkUBE94oIO/s1600/IMG_8395.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC2NleprX-E8twEYdKG6B_VEchXzK3nISBMpeN02Zv9vDGoJd1WkfnJnlfxQu8oNbY_Q3YFB6wjm7cRmjfPhQiV-qg7-y16K9dsIAmm25Vrg6aPsvsURpU9M7uIPwJjRKYB1hkUBE94oIO/s200/IMG_8395.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Montamos y atornillamos la placa sobre el interior de la caja, montamos el ventilador posterior, y comprobamos que ningún elemento interno obstaculiza la ventilación, ni produce ningún contacto no deseado:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4Z9eFNOawBSrBhl2YsZP2R1ftojFWbMrM7XTnr4GoEmkXcjJKt3aEgJpx-uEdGWpsVt-4KXKS5TZYjGErI46NLTos7FB17v7OHhh6QsLA1PTnUYW32AIsw7wZMXJfwTI1QJWsIzRunweK/s1600/IMG_8411.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4Z9eFNOawBSrBhl2YsZP2R1ftojFWbMrM7XTnr4GoEmkXcjJKt3aEgJpx-uEdGWpsVt-4KXKS5TZYjGErI46NLTos7FB17v7OHhh6QsLA1PTnUYW32AIsw7wZMXJfwTI1QJWsIzRunweK/s200/IMG_8411.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_W553tAZ3TmiwvLCCijXaUb47doafdAoSQf02QFoYnWJSMfggb3UucMzGjRMAnLvKSVVaar5LqULOh47PTY20DO7yTAljDH0JWPqZkUSfKyg-0VFbb9YRgBIAkgOfgDIj52k2EIjeXvgc/s1600/IMG_8414.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_W553tAZ3TmiwvLCCijXaUb47doafdAoSQf02QFoYnWJSMfggb3UucMzGjRMAnLvKSVVaar5LqULOh47PTY20DO7yTAljDH0JWPqZkUSfKyg-0VFbb9YRgBIAkgOfgDIj52k2EIjeXvgc/s200/IMG_8414.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Ahora conectamos los diferentes cables de alimentación de la caja, botones de encendido, reset, ventilador de CPU etc. y finalmente instalamos las RTX 2080ti y les proporcionamos alimentación directa desde la fuente:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvFWJF0QPmTx-gE7_HjnrS63fnZ1RYjYmD9lve47l0dfSnA0LK7YQYaCn8ghDLcgLDd1LEfyqHa3cYDR5oiPRKLXLcy5yVUF9TSSIboV0N9EdH7Tnwjru_-pk279W53HXC0pdAqXoVkLhA/s1600/IMG_8418.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvFWJF0QPmTx-gE7_HjnrS63fnZ1RYjYmD9lve47l0dfSnA0LK7YQYaCn8ghDLcgLDd1LEfyqHa3cYDR5oiPRKLXLcy5yVUF9TSSIboV0N9EdH7Tnwjru_-pk279W53HXC0pdAqXoVkLhA/s200/IMG_8418.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoVT2Xr6EQKZQRO1dYm2lWqXiTA4w56SvD2vvUzo-VFTF_o6wp68ePXtzDmYs67uvIqY3DWmSuDDJ49zBNVdCfoADraMmOdH11ueADbIU2G729UNDDw8pRKQMDNOUtg-UrbZNkwXp7WLzr/s1600/IMG_8419.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoVT2Xr6EQKZQRO1dYm2lWqXiTA4w56SvD2vvUzo-VFTF_o6wp68ePXtzDmYs67uvIqY3DWmSuDDJ49zBNVdCfoADraMmOdH11ueADbIU2G729UNDDw8pRKQMDNOUtg-UrbZNkwXp7WLzr/s200/IMG_8419.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_3i13OtoPTYqnfN2zB66NTx8FXhzpPQ7oU_AkCH1kTY_WZ4_6iDQ1fzhh4nFpoAuMmeKrEiC6ikywuTYK7BpdA4dDZBR4fZrJ8qyCjNWRvzJMEhfMt5DwfEs8e0yR9v1GJEK3rlO2981E/s1600/IMG_8420.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_3i13OtoPTYqnfN2zB66NTx8FXhzpPQ7oU_AkCH1kTY_WZ4_6iDQ1fzhh4nFpoAuMmeKrEiC6ikywuTYK7BpdA4dDZBR4fZrJ8qyCjNWRvzJMEhfMt5DwfEs8e0yR9v1GJEK3rlO2981E/s200/IMG_8420.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2xTRZktVbUWpkiM3F0JJbdlKNLbCEmU-IID32M66votZhssQwHC_I6Lhd225jPHGhQubYxWl-HFxYXxmjiMK2UbWcNQQ9qtxuH4vIz4KseNrQDJbVHkEg2tvDCgAkouT00m14Rz01VFxM/s1600/IMG_8421.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2xTRZktVbUWpkiM3F0JJbdlKNLbCEmU-IID32M66votZhssQwHC_I6Lhd225jPHGhQubYxWl-HFxYXxmjiMK2UbWcNQQ9qtxuH4vIz4KseNrQDJbVHkEg2tvDCgAkouT00m14Rz01VFxM/s200/IMG_8421.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJYuF5jzRUdydwWcLuJfqgtFmK7hWiHO-wokB49_7lhBdh3CnuMbLc-or2Jdq4o0brHhQLE-tXh0318SO1KBMQcUSF67MbloyGufUcz9M2g_AmObnHAAOnKHGScbHaQ2Pa6vEsTObGMuBz/s1600/IMG_8422.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJYuF5jzRUdydwWcLuJfqgtFmK7hWiHO-wokB49_7lhBdh3CnuMbLc-or2Jdq4o0brHhQLE-tXh0318SO1KBMQcUSF67MbloyGufUcz9M2g_AmObnHAAOnKHGScbHaQ2Pa6vEsTObGMuBz/s200/IMG_8422.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6swMPblZU7UPPSnlVvyRjKURDUuB3ZbCeG7SosAmf2OsgNAmOPU6rV_QJbURqt3N-ALtmywWPeurNxEKBuqeWNrZNqVGDnQasFQG9u_wZWGgY600V6GShTtswQ8mVXrFAfeTS-_hMzxqA/s1600/IMG_8423.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6swMPblZU7UPPSnlVvyRjKURDUuB3ZbCeG7SosAmf2OsgNAmOPU6rV_QJbURqt3N-ALtmywWPeurNxEKBuqeWNrZNqVGDnQasFQG9u_wZWGgY600V6GShTtswQ8mVXrFAfeTS-_hMzxqA/s200/IMG_8423.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Ahora solo queda comprobar que todas las conexiones están correctas, agrupamos los cables y los organizamos para facilitar el flujo de aire, y cerramos la caja:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4JURElnLqiY7RB4I2A0NnNO908JPG_px_SkGbZc0CxzedwHO-7q_vtSvSm1v3hYFkgmPf2Z8efOBEyNHdPVoQbkYTCiwhYBMYAGNOLm9GMgeN_dpM2f7MVMpcoeSreMjP8pNC1CovNTZ3/s1600/IMG_8465.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;480&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4JURElnLqiY7RB4I2A0NnNO908JPG_px_SkGbZc0CxzedwHO-7q_vtSvSm1v3hYFkgmPf2Z8efOBEyNHdPVoQbkYTCiwhYBMYAGNOLm9GMgeN_dpM2f7MVMpcoeSreMjP8pNC1CovNTZ3/s640/IMG_8465.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Para ponerle la guinda al pastel, he creado un sticker con el logo y el nombre de nuestra nueva máquina:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2LTS_AZffOmY3M0zVi0ZG80F267UYxNnKXOqHN9JKH1Jlc4upUdDn8YoCumm-_YcUORCfJqrSr9v3i6N_aQU7AOX3HFXgSaSC5Weh5PCG8eaElxpwbOZr-bujPAcpl1ctE-buyyo8XYZv/s1600/logo_kratos.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;841&quot; data-original-width=&quot;1600&quot; height=&quot;336&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2LTS_AZffOmY3M0zVi0ZG80F267UYxNnKXOqHN9JKH1Jlc4upUdDn8YoCumm-_YcUORCfJqrSr9v3i6N_aQU7AOX3HFXgSaSC5Weh5PCG8eaElxpwbOZr-bujPAcpl1ctE-buyyo8XYZv/s640/logo_kratos.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h3&gt;
Conclusiones&lt;/h3&gt;
Siendo honesto, no podría estar más contento con el rendimiento de este equipo. El flujo de aire está bastante conseguido en este modelo, manteniendo unas temperaturas aceptables cuando se encuentra a pleno rendimiento. En los siguientes posts veremos los diferentes pasos de instalación del SO y drivers, así como configuración y optimización de hashcat...&lt;br /&gt;
&lt;br /&gt;
Espero que os haya gustado!&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/649746917809837796/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2019/04/kratos-una-historia-de-password-cracking-especificaciones-tecnicas-y-montaje.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/649746917809837796'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/649746917809837796'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2019/04/kratos-una-historia-de-password-cracking-especificaciones-tecnicas-y-montaje.html' title='Kratos (una historia de Password Cracking): especificaciones técnicas y montaje'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6T5Yn71fdoYzzX2-oqJF0gywNz9SgMKh3mxh8rq4Fp2Pc2JrmNnVc243KwdDh5SN0QCUuABTrV6UseN0detS2MtLK_-fvymwOKGKrD_-dy8VhebA8ivj5bYinmiujKz8qh3hFogdV3KMD/s72-c/B38895D8-AA42-4D12-B0DF-57583B3B2F38.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-2691430678394918365</id><published>2019-04-10T22:31:00.001-07:00</published><updated>2019-04-11T00:14:35.630-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="IE"/><category scheme="http://www.blogger.com/atom/ns#" term="Master"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentesting"/><title type='text'>Examen del Master in Cybersecurity (IE School of HST) 2018 / 2019</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGfvf2wio5VK8SWbkFWnfy1YR7p5rC8bu8XEntkiX6VuP9wEaYDcYQIC0-WcZ9ACwPwuE28sq986AmM6BaplHfJ-PdZwt7Qs6Py4xn5hJ-fsdISl9-8i0213neSHNtOEpAtVMMaFl8dvNI/s1600/Exam-1-feat.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;420&quot; data-original-width=&quot;800&quot; height=&quot;336&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGfvf2wio5VK8SWbkFWnfy1YR7p5rC8bu8XEntkiX6VuP9wEaYDcYQIC0-WcZ9ACwPwuE28sq986AmM6BaplHfJ-PdZwt7Qs6Py4xn5hJ-fsdISl9-8i0213neSHNtOEpAtVMMaFl8dvNI/s640/Exam-1-feat.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Como ya sabéis muchos de vosotros, soy profesor del &lt;a href=&quot;https://www.ie.edu/school-human-sciences-technology/masters/master-cybersecurity/&quot; target=&quot;_blank&quot;&gt;Master in Cybersecurity&lt;/a&gt; del &lt;a href=&quot;https://www.ie.edu/school-human-sciences-technology/&quot; target=&quot;_blank&quot;&gt;IE School of HST&lt;/a&gt;. Todos los años por estas fechas, toca poner a prueba los conocimientos adquiridos por mis alumnos durante las diferentes sesiones que hemos pasado juntos. De forma directa o indirecta, se repasan todos los conceptos que les he proporcionado a través de las slides, sesiones prácticas y ejercicios que debe realizar cada semana.&lt;br /&gt;
&lt;br /&gt;
A continuación veréis la parte tipo Test del examen de este año, que tienen que realizar en papel, durante un examen de de una hora y media en el que, además, también deben completar una parte práctica con ejercicios de XSS, SQLi, OSINT, Criptografía o Password Cracking entre otras muchas cosas...&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Si os animáis, también podéis hacerlo vosotros y saber como andáis de conocimientos. El master se imparte en inglés, por lo que os dejo el examen directamente con alguna pequeña variación }:)&lt;/div&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;h3&gt;
&lt;b&gt;&lt;br /&gt;QUESTIONS&lt;/b&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;What is the primary goal of an Ethical Hacker?&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Avoiding detection&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Determining return on investment (ROI) for security measures&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Resolving security vulnerabilities&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Testing security controls&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;An ethical hacker is hired by an organization to gain remote access to their internal network. He has not received any information about the internal network of the organization. What kind of test is carried out here?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. black box testing&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. grey box testing&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. white box testing&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Mary has added an apostrophe after an ?id= parameter within the URL of a webpage. She now sees an error, saying there was a syntax error. What did Mary find?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Cross-Site Scripting vulnerability&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. PostgreSQL database exploit&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. SQL Injection&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;A site uses dynamically generated content. By making use of a specific technique, it is possible to steal login credentials of the user. Which technique is meant here?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Session Hijacking&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. SQL injection&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Cross Site Scripting (XSS)&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;You have found a live system on IP address 192.168.10.113. Which nmap command lets you detect the Operating System of a target?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. nmap -O 192.168.10.113&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. nmap -Os 192.168.10.113&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. nmap -os 192.168.10.113&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;A service scan including fingerprint showed that a target machine is running Apache 2.2.14. What could be the next step to check if this service is vulnerable?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Check online resources such as Exploit-DB, OSVDB for known vulnerabilities.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Use nslookup to determine Apache configuration and patch level.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Use burp to gain access to the machine through this service.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;You know the table and column names from a database, you can expand your SQL Injection to retrieve data. What should you use?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. UNION GET&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. UNION SELECT&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. UNION CONCAT&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Before beginning the ethical hack at a client, a penetration tester should always be prepared for any legal issues. What should the penetration tester do to prevent legal liability?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Analyze the environment of the client to see if there are any vulnerabilities that might cause issues before the actual ethical hack.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Sign a contract with the client before performing the ethical hack.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Talk to the client before the test and make sure whether the test has to be a black, grey or white box test.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;At what point in the Ethical Hacking process is the attacker most likely to use a port scanning tool?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Attack execution&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Attack preparation&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Information gathering&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Report writing&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;A penetration tester wants to know what IP addresses are currently active on the network. He uses nmap to do so. What nmap switch does he need to perform this test?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. -sU&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. -sO&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. -sP&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;A client has said that he created a case-insensitive filter for &#39;script&#39; from being inserted in any forms to prevent an XSS PoC. How can you bypass this?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. &amp;lt;sCrIPt&amp;gt;alert(1);&amp;lt;/ScRiPT&amp;gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. &amp;lt;javascript&amp;gt;alert(1);&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. &amp;lt;img src=x onerror=alert(1)&amp;gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;A hacker managed to find an XSS vulnerability. Now she wants to take over sessions.Where does she need the data retrievable from?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. document.session&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. session.cookie&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. document.cookie&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;When creating an XSS PoC, what is the function that provides a pop-up?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. popup()&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. alert()&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. window.popup()&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;A penetration tester is asked to scan a machine, but is only allowed to check if TCP/IP ports 21, 22, 80 and 443 are open. What should she use?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. nmap -vv -A -p 21,22,80,https &amp;lt;target&amp;gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. nmap -vv -p 21,22,80,443 &amp;lt;target&amp;gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. nmap -sV ftp, ssh, http, https &amp;lt;target&amp;gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;An Ethical Hacker is asked to perform a penetration test for a client and all he has received is a URL. What kind of test is this?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Black box penetration test&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Black hat hacking test&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. White box penetration test&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;A penetration tester is testing a web application. To check for vulnerabilities she decides to check if SQL injections are possible. Which character is typically used first by the penetration tester?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Dollar sign&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Semicolon&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Single quote&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;An ethical hacker is trying to breach a website through SQL Injection. He also changed his UserAgent HTTP header, sent by his browser. What can he achieve with this action?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. He acquires a matching SSL connection.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. He obtains better performance of the website so that it responds faster to his requests.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. He prevents forensics from revealing his real browser that was used during the attac&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;When looking at webserver log files, Pete wants to know what browser was used during the attack against his website. Pete should look for information that is generally being sent through the &amp;lt;answer&amp;gt; header. Which &amp;lt;answer&amp;gt; header does it concern?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Accept-Language:&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Host:&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. User-Agent:&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;A company has suffered from a DDoS attack. They have the IP address of the attacker and want to contact their Internet Service Provider to report an abuse. What must they perform?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. DNS Lookup&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. GeoIP Location Lookup&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. WHOIS Lookup&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;A penetration tester is scanning the network environment of his client with a tool. This tool has the following properties:&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;- It uses a ranking to show the impact of a vulnerability.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;- It detects all sorts of vulnerabilities on various operating systems such as Windows, Linux and Mac OS.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;- It is able to detect bots, trojans and other malware that might be installed on the computers connected to the network.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;What is the name of the tool the penetration tester is using?&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Nessus&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Nmap&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Nikto&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;What will an open port return from an ACK scan?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Nothing&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. SYN/ACK&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. RST&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. FIN&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system. If a scanned port is open, what happens?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. The port will ignore the packets&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. The port will send an RST&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. The port will send a SYN&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. The port will send an ACK&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Passive reconnaissance involves collecting information through which of the following?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Social engineering&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Network traffic sniffing&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Man in the middle attacks&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Publicly accessible sources&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;What is the default Password Hash Algorithm used by NTLMv2?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. MD4&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. DES&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. SHA-1&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. MD5&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Which property ensures that a hash function will not produce the same hashed value for two different messages?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Collision resistance&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Bit length&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Key strengt&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Entropy&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;This method is used to determine the Operating system and version running on a remote target system. What is it called?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Service Degradation&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. OS Fingerprinting&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Manual Target System&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Identification Scanning&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Which of the following is designed to identify malicious attempts to penetrate systems?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Intrusion Detection System&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Router&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Proxy&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Firewall&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;PGP, SSL, and IKE are all examples of which type of cryptography?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Hash Algorithm&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Secret Key&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Public Key&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Digest&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;NTP allows you to set the clocks on your systems very accurately, to within 100ms and sometimes-even 10ms. Knowing the exact time is extremely important for enterprise security. Various security protocols depend on an accurate source of time information in order to prevent &quot;playback&quot; attacks.&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;These protocols tag their communications with the current time, to prevent attackers from replaying the same communications, e.g., a login/password interaction or even an entire communication, at a later date.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;One can circumvent this tagging, if the clock can be set back to the time the communication was recorded.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;An attacker attempts to try corrupting the clocks on devices on your network.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;You run Wireshark to detect the NTP traffic to see if there are any irregularities on the network.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;What port number you should enable in Wireshark display filter to view NTP packets?&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. TCP Port 124&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. UDP Port 125&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. UDP Port 123&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. TCP Port 126&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;You can find XSS vulnerabilities in which of the following?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Search fields that echo a search string back to the user&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. HTTP headers&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Input fields that echo user data&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. All of the above&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Software developers should escape all characters (including spaces but excluding alphanumeric characters) with the HTML entity &amp;amp;#xHH; format to prevent what type of attack?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. DDoS attacks&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. XSS attacks&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. CSRF attacks&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Brute-force attacks&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Which of the following tools is used to perform a credential brute force attack?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Hydra&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. John the Ripper&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Hashcat&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Peach&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Jason, a penetration tester, is testing a web application that he knows is vulnerable to an SQL injection but the results of the injection are not visible to him.&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;He tried waitfor delay command to check the SQL execution status which confirmed the presence of the SQL injection vulnerability.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Which type of SQL injection Jason is attempting on the web application?&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Blind SQL injection&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Error-based SQL injection&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. UNION SQL Injection&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Simple SQL Injection&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;What are the limitations of Vulnerability scanners? (Select 2 answers)&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. There are often better at detecting well-known vulnerabilities than more esoteric ones&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. The scanning speed of their scanners are extremely hig&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. It is impossible for any, one scanning product to incorporate all known vulnerabilities in a timely manner&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. The more vulnerabilities detected, the more tests required&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; E. They are highly expensive and require per host scan license&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;In order to compromise or to hack a system or network the hackers go through various phases of the hacking.&amp;nbsp; What is the first hacking phase that hackers perform to gather information about a target prior to launching an attack?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Reconnaissance&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Scanning&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Gaining Access&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Maintaining Access&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; E. Clearing Track&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Nmap&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. John the Ripper&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Snort&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Nikto&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Which tool queries publicly available databases that contain domain name registration contact information?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. burp&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. nikto&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. whois&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. nslookup&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Which type of scan does NOT open a full TCP connection?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Stealth Scan&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. XMAS Scan&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Null Scan&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. FIN Scan&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;What is the best description of SQL Injection?&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. It is an attack used to gain unauthorized access to a database.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. It is an attack used to modify code in an application.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. It is a Man-in-the-Middle attack between your SQL Server and Web App Server.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. It is a Denial of Service Attack.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;What techniques would you use to evade IDS during a Port Scan? (Select 4 answers)&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. Use fragmented IP packets&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. Spoof your IP address when launching attacks and sniff responses from the server&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. Overload the IDS with Junk traffic to mask your scan&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. Use source routing (if possible)&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; E. Connect to proxy servers or compromised Trojaned machines to launch attacks&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-style: italic;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;TCP SYN Flood attack uses the three-way handshake mechanism.&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;1. An attacker at system A sends a SYN packet to victim at system B&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;2. System B sends a SYN/ACK packet to victim A&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;3. As a normal three-way handshake mechanism system A should send an ACK packet to system B, however, system A does not send an ACK packet to system &quot;B&quot;. In this case client B is waiting for an ACK packet from client A&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;This status of client B is called _________________&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; A. &quot;half-closed&quot;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; B. &quot;half open&quot;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; C. &quot;full-open&quot;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp; &amp;nbsp; D. &quot;xmas-open&quot;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/2691430678394918365/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2019/04/examen-master-in-cyber-security-IE-2018.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/2691430678394918365'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/2691430678394918365'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2019/04/examen-master-in-cyber-security-IE-2018.html' title='Examen del Master in Cybersecurity (IE School of HST) 2018 / 2019'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGfvf2wio5VK8SWbkFWnfy1YR7p5rC8bu8XEntkiX6VuP9wEaYDcYQIC0-WcZ9ACwPwuE28sq986AmM6BaplHfJ-PdZwt7Qs6Py4xn5hJ-fsdISl9-8i0213neSHNtOEpAtVMMaFl8dvNI/s72-c/Exam-1-feat.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-8720268321080372874</id><published>2019-04-08T03:01:00.000-07:00</published><updated>2019-05-06T14:04:42.019-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fraude"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="password cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentesting"/><category scheme="http://www.blogger.com/atom/ns#" term="scam"/><title type='text'>Descubriendo la estafa de un Intel® Core™ i9</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx-pxhYhKGbb7k5kn17-EU-V4AJgaZdcd0PlMQVYVMJc31bFSb3dMQgKMOA9rK7CZWp-FoBOdt74bwEF2T7VXHrvMsC8qKzOeNTAKSNUh4PpQgIPqN9kqD9PUOKJhBtHUT104ulUxAQ2ZB/s1600/dbcef763-7d66-49d0-a74f-49f1b62868a3._CR00970300_PT0_SX970__.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;300&quot; data-original-width=&quot;970&quot; height=&quot;196&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx-pxhYhKGbb7k5kn17-EU-V4AJgaZdcd0PlMQVYVMJc31bFSb3dMQgKMOA9rK7CZWp-FoBOdt74bwEF2T7VXHrvMsC8qKzOeNTAKSNUh4PpQgIPqN9kqD9PUOKJhBtHUT104ulUxAQ2ZB/s640/dbcef763-7d66-49d0-a74f-49f1b62868a3._CR00970300_PT0_SX970__.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
Como ya sabréis, hace poco dimos una charla en &lt;a href=&quot;https://www.rootedcon.com/&quot; target=&quot;_blank&quot;&gt;RootedCon&lt;/a&gt; sobre &lt;a href=&quot;https://es.slideshare.net/segofensiva/i-know-your-p4w0rd-and-if-i-dont-i-will-guess-it-139829304&quot; target=&quot;_blank&quot;&gt;técnicas avanzadas de Password Cracking&lt;/a&gt; que puedan surgir en tu Red Team o Blue Team. Como consecuencia de esto, decidí actualizar laboratorio, incluyendo una máquina propia y no tener que depender de instancias en la nube. La configuración era como la publicada en el siguiente tweet:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;blockquote class=&quot;tw-align-center twitter-tweet&quot; data-lang=&quot;en&quot;&gt;
&lt;div dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Building a small and well suited password cracking rig: 2x2080ti, i9 9900k, MSI Z390m, 64Gb DDR4 &amp;amp; 1Tb NVMe PCIe 😈 &lt;a href=&quot;https://twitter.com/hashtag/weekendfun?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#weekendfun&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/passwordcracking?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#passwordcracking&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/2x2080ti?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#2x2080ti&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/Kratos?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#Kratos&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/codename?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#codename&lt;/a&gt; &lt;a href=&quot;https://t.co/S2EkppSsyh&quot;&gt;pic.twitter.com/S2EkppSsyh&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
— Jaime Sanchez (@segofensiva) &lt;a href=&quot;https://twitter.com/segofensiva/status/1114537279912140800?ref_src=twsrc%5Etfw&quot;&gt;April 6, 2019&lt;/a&gt;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;https://platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;

Estoy seguro de que todos conocéis ya de sobra la gama de procesadores Intel, con sus diferentes variantes y velocidades. Al igual que cualquier otro producto conocido, están abocados a tener falsificaciones y a la picaresca de unos cuantos. Las falsificaciones de un producto como un iPhone, MacBook e incluso procesadores Intel son adecuadas para generar fraude y dinero de forma sencilla, ya que es un producto con mucho mercado. Sin embargo, el proceso para falsificar/realizar un fraude con un procesador Intel es un tanto curioso.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
Os voy a contar la historia de lo que me encontré recientemente mientras montaba mi nueva máquina &#39;&lt;a href=&quot;https://www.seguridadofensiva.com/2019/04/kratos-una-historia-de-password-cracking-especificaciones-tecnicas-y-montaje.html&quot; target=&quot;_blank&quot;&gt;Kratos&lt;/a&gt;&#39; durante el fin de semana... }:)&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Como iba diciendo, estaba en medio del proceso de montar mi nueva máquina, que os explicaré más adelante en otro post. Cuando llegó el momento de montar el CPU y el disipador sobre la placa, me di cuenta que algo no estaba bien. A pesar de que compré el &lt;a href=&quot;https://www.intel.la/content/www/xl/es/products/processors/core/i9-processors/i9-9900k.html&quot; target=&quot;_blank&quot;&gt;i9 9900k&lt;/a&gt; como producto nuevo, había algunas pegatinas que claramente habían sido recolocadas de nuevo sobre la caja, y el producto parecía que había sido reempaquetado cuidadosamente.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
La sorpresa viene cuando al sacar el procesador, toca montarlo sobre el socket de la placa. Vaya! Algo no está bien, parece que las muescas de no encajan con las que deberían ser. Compruebo que la placa que he comprado, una &lt;a href=&quot;https://www.msi.com/Motherboard/MPG-Z390M-GAMING-EDGE-AC/Specification&quot; target=&quot;_blank&quot;&gt;MSI Z390m&lt;/a&gt;, soporta el socket 1151 que lleva el i9, y sí, sí que lo hace. Así que voy a buscar a Google una foto del mismo para ver que está ocurriendo, por si hubiera algún defecto de fabricación, encontrándome esto:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3jdC5lUjA-O_kLhlklGI_K5UAShpOAkB89NcitxcREo05YvlrJaFX9zbfQVbs0lpXrl8VrBsM3w38ycWg26Ps9ApW8z4PzUkhArvRjlp9P-ZilXcy4C5WtpgoQ_qYrdhpBs-5rQH_XLdN/s1600/IMG_8350.PNG&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;650&quot; data-original-width=&quot;1100&quot; height=&quot;378&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3jdC5lUjA-O_kLhlklGI_K5UAShpOAkB89NcitxcREo05YvlrJaFX9zbfQVbs0lpXrl8VrBsM3w38ycWg26Ps9ApW8z4PzUkhArvRjlp9P-ZilXcy4C5WtpgoQ_qYrdhpBs-5rQH_XLdN/s640/IMG_8350.PNG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Empiezan las sospechas, ya que las muescas que mi procesador lleva no son exactamente iguales, es decir, se encuentran en la parte izquierda y derecha de la placa, cuando el original las lleva sobre el lado izquierdo y derecho. La cuestión es que esa disposición ya la había visto antes, así que acudo de nuevo a Internet y reviso la gama de procesadores Intel desde hace unos años hasta ahora y Bingo! encuentro una posible coincidencia:&lt;/div&gt;
&lt;blockquote class=&quot;tw-align-center twitter-tweet&quot; data-lang=&quot;en&quot;&gt;
&lt;div dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Spot a fake CPU!! Someone is taking and delidding old core2duo, buying and delidding a brand new i9, swapping lids, reglueing and then returning the old one with the new lid to &lt;a href=&quot;https://twitter.com/AmazonESP?ref_src=twsrc%5Etfw&quot;&gt;@AmazonESP&lt;/a&gt;. Take a look at pictures. On the left, i9 9900k I’ve just received... &lt;a href=&quot;https://twitter.com/hashtag/scam?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#scam&lt;/a&gt; &lt;a href=&quot;https://twitter.com/hashtag/fakecpu?src=hash&amp;amp;ref_src=twsrc%5Etfw&quot;&gt;#fakecpu&lt;/a&gt; &lt;a href=&quot;https://t.co/O3MixquKn6&quot;&gt;pic.twitter.com/O3MixquKn6&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
— Jaime Sanchez (@segofensiva) &lt;a href=&quot;https://twitter.com/segofensiva/status/1114891059362959360?ref_src=twsrc%5Etfw&quot;&gt;April 7, 2019&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;https://platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;

&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Como se puede apreciar en la imagen, el supuesto i9 que he recibido es el de la izquierda, mientras que a la derecha nos encontramos un &lt;a href=&quot;https://ark.intel.com/content/www/us/en/ark/products/33910/intel-core-2-duo-processor-e8400-6m-cache-3-00-ghz-1333-mhz-fsb.html&quot; target=&quot;_blank&quot;&gt;Core2Duo e8400&lt;/a&gt;, que encajan perfectamente en la descripción,&amp;nbsp; en la falta de &#39;wings&#39; o pequeñas alas características en la parte superior, así como en la colocación de las muescas (&lt;a href=&quot;http://www.buildcomputers.net/installing-a-cpu.html&quot; target=&quot;_blank&quot;&gt;notches&lt;/a&gt;), que existen para que no puedas encajar la CPU en la placa de una forma incorrecta.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
El paso siguiente es comprobar los números de serie originales, cosa que podemos hacer en la correspondiente etiqueta de la caja. Veréis algo similar a esto:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs-YPiGt4IAu7eTubthha0q10pJz4P4P9so5JaC3ilrLr0hbkTUv0Tp_-KYQ2dIERM_rBhf5TwK1kIL5ky6US92CU8tb45QHg9q33Hy_3B5PXSzO_lzKzK_YEo_WZbW-qJK9HxWndYRy1m/s1600/5906_boxed-numbers.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;299&quot; data-original-width=&quot;600&quot; height=&quot;318&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhs-YPiGt4IAu7eTubthha0q10pJz4P4P9so5JaC3ilrLr0hbkTUv0Tp_-KYQ2dIERM_rBhf5TwK1kIL5ky6US92CU8tb45QHg9q33Hy_3B5PXSzO_lzKzK_YEo_WZbW-qJK9HxWndYRy1m/s640/5906_boxed-numbers.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
Con esa información, vamos a contrastarla con la que viene sobre la superficie de nuestra CPU, que tiene varios números de serie:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;/div&gt;
&lt;ol&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;Número de lote (&lt;b&gt;FPO&lt;/b&gt;): se encuentra en la parte superior del procesador.&lt;/li&gt;
&lt;li&gt;Número de serie parcial (&lt;b&gt;ATPO&lt;/b&gt; parcial): se encuentra en el borde exterior del procesador. El número de serie parcial contiene los últimos tres a cinco dígitos del número de serie completo del procesador. Se imprime en formato legible por humanos en los bordes exteriores del procesador.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Matriz 2D:&lt;/b&gt;&amp;nbsp;contiene el número de serie completo del procesador. Esta matriz debe leerse utilizando una herramienta de terceros y ciertas cámaras smartphones.&lt;/li&gt;
&lt;/ol&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
Vea el ejemplo a continuación en las ubicaciones de cada marca:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBuY2K-c24tGa2nAzjAWYFkPbV_z-SDRJJ9oKAwM_UPDcn4N2kO72VE9aXhrXbN68IKqbRQRC7Mzj_C2_ng5PW1UbYQhbWLWxMi4KTkVe3xtDZ0avWf2PUwYMfh3YEKH72ajHroMGQHEan/s1600/5609_processor-markings.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;241&quot; data-original-width=&quot;550&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBuY2K-c24tGa2nAzjAWYFkPbV_z-SDRJJ9oKAwM_UPDcn4N2kO72VE9aXhrXbN68IKqbRQRC7Mzj_C2_ng5PW1UbYQhbWLWxMi4KTkVe3xtDZ0avWf2PUwYMfh3YEKH72ajHroMGQHEan/s1600/5609_processor-markings.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
Con todos esos datos, que además coincidían entre el procesador y la caja que había recibido, me dirigí a la página oficial de soporte y garantía de Intel (&lt;a href=&quot;https://supporttickets.intel.com/warrantyinfo?lang=en-US&quot;&gt;https://supporttickets.intel.com/warrantyinfo?lang=en-US&lt;/a&gt;) y comprobé la CPU que había recibido con esos números de serie:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg12KajYL6XK3bUdhsDp0edv-UAFgc5JLrMvF1LZASVmmkEQmAKuhBH5lpelMVbQct3DVIMb5mhfPTj8zY2Rnd3k4zsVe4-1X7n3MALNqUjPHaDk1_qUi54Jygk33y-_bGjSWzJ1lXZg_dN/s1600/Captura+de+pantalla+2019-04-07+a+las+17.55.48.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;246&quot; data-original-width=&quot;1600&quot; height=&quot;98&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg12KajYL6XK3bUdhsDp0edv-UAFgc5JLrMvF1LZASVmmkEQmAKuhBH5lpelMVbQct3DVIMb5mhfPTj8zY2Rnd3k4zsVe4-1X7n3MALNqUjPHaDk1_qUi54Jygk33y-_bGjSWzJ1lXZg_dN/s640/Captura+de+pantalla+2019-04-07+a+las+17.55.48.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
Si el número es correcto y además todo coincide... ¿Qué está pasando aquí? ¿Un fallo en la cadena de producción de Intel que afecta al diseño? Pues la respuesta es bastante más sencilla que todo eso...&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
El truco radica en la pegatina y la parte superior del procesador. Se puede ver claramente que la etiqueta pone Intel i9-9900k, pero después de despegar la etiqueta, nos encontramos otra CPU con la inscripción superior eliminada. Los estafadores, en la mayoría de los casos, hacen un &lt;a href=&quot;https://hardwaresfera.com/noticias/21895-2/&quot; target=&quot;_blank&quot;&gt;delid&lt;/a&gt; de dos CPU (una antigua como este Core2Duo y una nueva como el i9 9900k):&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;i&gt;&quot;Esta práctica tiene cosas buenas, ya que permite reducir unos 10ºC de media la temperatura del procesador, cuando cambiamos la pasta térmica interna que mejora la superficie de contacto entre el silicio de los núcleos y la superficie metálica que lo protege.&quot;&lt;/i&gt;&lt;/blockquote&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
Hay estar atentos a estas prácticas, ya que podemos encontrarnos diferentes variantes. Lijar la parte superior, colocando una pegatina falsa o directamente la de la CPU nueva, para hacerla pasar por ésta, (cono en el caso que me ha ocurrido), o&amp;nbsp;intercambian la parte superior, el &lt;b&gt;IHS&lt;/b&gt; (del inglés Integrated Heat Spreader) para que los operadores al realizar las comprobaciones de número de serie en la devolución no se percaten, y realizan un reembolso de la CPU comprada, que realmente es el Core2Duo, de tal forma que se quedan con el i9 y el dinero que deberían haber pagado:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn-ondf6N8va9bbCN5M5Ny3aEFarPJf6KFAd86uHCz3Ld0XQJP9vI2M1fmeR5H9thLMufpc1SGTfhhyphenhyphennn2FLTGBcodRcWzqIMQFs029cggJKDuO2ZkPBY6PtqiBthHeA5Cs1TWbvynb_ML/s1600/09.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;770&quot; data-original-width=&quot;1400&quot; height=&quot;352&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn-ondf6N8va9bbCN5M5Ny3aEFarPJf6KFAd86uHCz3Ld0XQJP9vI2M1fmeR5H9thLMufpc1SGTfhhyphenhyphennn2FLTGBcodRcWzqIMQFs029cggJKDuO2ZkPBY6PtqiBthHeA5Cs1TWbvynb_ML/s640/09.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
En mi caso he recibido un Core2Duo cuyo socket &lt;a href=&quot;https://es.wikipedia.org/wiki/LGA_775&quot; target=&quot;_blank&quot;&gt;LGA775&lt;/a&gt; es bastante diferente del &lt;a href=&quot;https://es.wikipedia.org/wiki/LGA_1151&quot; target=&quot;_blank&quot;&gt;LGA1151&lt;/a&gt; que llevaría el i9, pero si los estafadores quisieran intentar pasar más desapercibidos, podrían utilizar un &lt;a href=&quot;https://ark.intel.com/content/www/us/en/ark/products/97452/intel-celeron-processor-g3930-2m-cache-2-90-ghz.html&quot; target=&quot;_blank&quot;&gt;Celeron&amp;nbsp;G3930&lt;/a&gt; que lleva el mismo tipo de socket, en cuyo caso sólo nos daríamos cuenta al arrancar el equipo y obtener información de la CPU de nuestro sistema, ya que el rendimiento sería tremendamente inferior, además de tener menor número de cores etc.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;blockquote class=&quot;tw-align-center twitter-tweet&quot; data-lang=&quot;en&quot;&gt;
&lt;div dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;
Sold and sent by Amazon. Supposed to be brand new 🤷🏻‍♂️ take a look at the notches... &lt;a href=&quot;https://t.co/D0MR8Ak88Q&quot;&gt;pic.twitter.com/D0MR8Ak88Q&lt;/a&gt;&lt;/div&gt;
— Jaime Sanchez (@segofensiva) &lt;a href=&quot;https://twitter.com/segofensiva/status/1114901089998995457?ref_src=twsrc%5Etfw&quot;&gt;April 7, 2019&lt;/a&gt;&lt;/blockquote&gt;
&lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;https://platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;

&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
Así que tened cuidado al realizar estas compras, ya que podéis tener algún problema como el que os he comentado. Yo por el momento ya he informado a Amazon y mañana me enviarán un i9 9900k nuevo, que esperemos que no tenga el mismo problema y pueda acabar de montar mi nueva máquina &lt;a href=&quot;https://www.seguridadofensiva.com/2019/04/kratos-una-historia-de-password-cracking-especificaciones-tecnicas-y-montaje.html&quot;&gt;Kratos&lt;/a&gt;! }:)&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
Ese proceso se convertirá en un nuevo post en el que os mostraré el proceso y el rendimiento, y espero poder finalizarlo pronto.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
¿Alguien más ha sufrido este intento de estafa por parte de terceros al comprar componentes en tiendas online? Para ser que en Reddit algún usuario ha sufrido este intento en EEUU, incluso ya se realiza con las GPU 1080ti que se venden por eBay, pero no conocía ningún caso en España...&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/8720268321080372874/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2019/04/anatomy-of-intel-cpu-scam.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/8720268321080372874'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/8720268321080372874'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2019/04/anatomy-of-intel-cpu-scam.html' title='Descubriendo la estafa de un Intel® Core™ i9'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx-pxhYhKGbb7k5kn17-EU-V4AJgaZdcd0PlMQVYVMJc31bFSb3dMQgKMOA9rK7CZWp-FoBOdt74bwEF2T7VXHrvMsC8qKzOeNTAKSNUh4PpQgIPqN9kqD9PUOKJhBtHUT104ulUxAQ2ZB/s72-c/dbcef763-7d66-49d0-a74f-49f1b62868a3._CR00970300_PT0_SX970__.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-6793015760707818989</id><published>2019-04-06T06:29:00.000-07:00</published><updated>2019-05-06T05:48:05.688-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="Herramientas"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="password cracking"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentesting"/><category scheme="http://www.blogger.com/atom/ns#" term="Rootedcon"/><title type='text'>Disponibles las Slides de &#39;I know your P4$$w0rd (and if I don’t, I will guess it)&#39;</title><content type='html'>&lt;center&gt;
&lt;img border=&quot;0&quot; data-original-height=&quot;640&quot; data-original-width=&quot;640&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt7jDqK5a7EDK4JoKE8kHLQoyfzPM7eRFr8JdwyBgciZi2cLP98dA3dZDyz9E_iemm6TullKqsuyGPEdjISk58XoAZqIDyjs2yEoD-qjjw0RXn4UhZeKr6oadWRsy60JNxOXyC8w9_0o2C/s400/logo.png&quot; width=&quot;400&quot; /&gt;&lt;/center&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
Ya están disponibles las slides de la charla que Pablo Caro y yo dimos en RootedCon 2019, titulada &#39;&lt;b&gt;I KNOW YOUR P4$$W0RD (AND IF I DON’T, I WILL GUESS IT)&lt;/b&gt;&#39;.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
En breve publicaremos las wordlist, reglas, mascaras etc. de forma pública }:)&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Como sabéis, tratamos muchas formas de afrontar una sesión de password cracking, utilizando conocimiento a través de distintos análisis conductuales y estadísticos para, utilizando redes neuronales y otras técnicas avanzadas, obtener patrones que nos permitan crackear hashes cuya resistencia suele ser bastante alta utilizando otras técnicas.&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;center&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;485&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;//www.slideshare.net/slideshow/embed_code/key/klS3VbaxeqM4Wv&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;595&quot;&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style=&quot;margin-bottom: 5px;&quot;&gt;
&lt;/div&gt;
&lt;/center&gt;
&lt;br /&gt;
Puedes descargar también las máscaras, reglas y las wordlists que presentamos desde el &lt;a href=&quot;https://github.com/kaonashi-passwords/kaonashi&quot;&gt;repositorio oficial de Github&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Happy password cracking! }:)</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/6793015760707818989/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2019/04/slides-disponibles-de-i-know-your-password-rooted-2019.html#comment-form' title='2 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/6793015760707818989'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/6793015760707818989'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2019/04/slides-disponibles-de-i-know-your-password-rooted-2019.html' title='Disponibles las Slides de &#39;I know your P4$$w0rd (and if I don’t, I will guess it)&#39;'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjt7jDqK5a7EDK4JoKE8kHLQoyfzPM7eRFr8JdwyBgciZi2cLP98dA3dZDyz9E_iemm6TullKqsuyGPEdjISk58XoAZqIDyjs2yEoD-qjjw0RXn4UhZeKr6oadWRsy60JNxOXyC8w9_0o2C/s72-c/logo.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-1210043115957330881</id><published>2019-03-23T12:18:00.001-07:00</published><updated>2019-04-04T13:07:38.966-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Herramientas"/><category scheme="http://www.blogger.com/atom/ns#" term="Rootedcon"/><title type='text'>I know your P4$$w0rd (and if I don’t, I will guess it) - Rootedcon 2019</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;center&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjonZI3cclcS72BQd5zodLLgNlG77xH1Jfm5pNz-MPtEayscAFiaI8Ud55d6V3W1fdOEoDmbiuCAdR8L2q8xwsez8GcygG6A-BojC8YdFmzMBxrDOQNrV_soo0rCJitCpKO8KSxZ9OMGRXd/s1600/E09D5C2B-0827-429A-A971-111A07846E4F.jpeg&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;480&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjonZI3cclcS72BQd5zodLLgNlG77xH1Jfm5pNz-MPtEayscAFiaI8Ud55d6V3W1fdOEoDmbiuCAdR8L2q8xwsez8GcygG6A-BojC8YdFmzMBxrDOQNrV_soo0rCJitCpKO8KSxZ9OMGRXd/s640/E09D5C2B-0827-429A-A971-111A07846E4F.jpeg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/center&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
La conferencia de seguridad informática &lt;a href=&quot;https://www.rootedcon.com/&quot; target=&quot;_blank&quot;&gt;Rooted CON&lt;/a&gt; nació con el propósito de promover el intercambio de conocimientos entre los miembros de la comunidad de seguridad.&amp;nbsp;La edición de este año 2019 tendrá lugar del 28 al 30 de marzo en Kinépolis (Madrid).&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Para mi Rooted es un congreso al que tengo mucho cariño. A pesar de haber hablado en muchas otras grandes conferencias, como Blackhat, Defcon, Shmoocon, Derbycon o Nuit du Hack, por nombrar algunas, podríamos decir que esta conferencia fue la que me vio nacer y me brindó una oportunidad durante los inicios.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Por eso, me gustaría anunciaros con orgullo que vuelvo a las andadas &lt;b&gt;}:)&lt;/b&gt; y este &lt;b&gt;Viernes 29 a las 10.00 am&lt;/b&gt; estaremos en la Sala Cibeles mi compañero Pablo J Caro y yo dando un charla que hemos llamado &quot;&lt;b&gt;I know your P4$$w0rd (and if I don’t, I will guess it)&lt;/b&gt;&quot;, y compartiendo espacio y un buen rato con otra gran cantidad de profesionales que también estarán allí presentes&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
En ella hablaremos de temas relacionados con el password cracking, conceptos válidos para Red / Blue Teams, de nuestro desarrollo privado &lt;a href=&quot;https://www.kaonashi.info/&quot; target=&quot;_blank&quot;&gt;Kaonashi&lt;/a&gt; y un montón de cosas interesantes.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Cuando un usuario tiene que elegir una contraseña, tiende a construirla de la misma forma, con la misma información personal como base, y usando las mismas ideas para añadir complejidad a la misma. En este estudio que os mostraremos , nos hicimos con varios miles de millones de contraseñas reales, con el fin de hacer un análisis a gran escala de esos comportamientos comunes, extrayendo conclusiones que nos permitan crear procedimientos y herramientas específicas para mejorar las técnicas actuales de Password Cracking.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Finalmente, usaremos este conocimiento obtenido a través de distintos análisis conductuales y estadísticos para, utilizando redes neuronales y otras técnicas avanzadas, obtener patrones que nos permitan crackear hashes cuya resistencia suele ser bastante alta utilizando otras técnicas.

&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
Quiza dentro de poco volvamos a vernos más frecuentemente, os mantendré informados...&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Espero veros a todos allí!&amp;nbsp;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/1210043115957330881/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2019/03/i-know-your-p4w0rd-and-if-i-dont-i-will-rootedcon-2019.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/1210043115957330881'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/1210043115957330881'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2019/03/i-know-your-p4w0rd-and-if-i-dont-i-will-rootedcon-2019.html' title='I know your P4$$w0rd (and if I don’t, I will guess it) - Rootedcon 2019'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjonZI3cclcS72BQd5zodLLgNlG77xH1Jfm5pNz-MPtEayscAFiaI8Ud55d6V3W1fdOEoDmbiuCAdR8L2q8xwsez8GcygG6A-BojC8YdFmzMBxrDOQNrV_soo0rCJitCpKO8KSxZ9OMGRXd/s72-c/E09D5C2B-0827-429A-A971-111A07846E4F.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-6616310817086161617</id><published>2014-08-05T16:37:00.001-07:00</published><updated>2018-07-30T05:29:09.673-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Arsenal"/><category scheme="http://www.blogger.com/atom/ns#" term="Blackhat"/><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Herramientas"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacidad"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp Privacy Guard"/><title type='text'>Visita a Black Hat USA 2014</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1QDW02j3p2IVNheDiNUCgAqVkMqssAZTC69WLLcwwVKHzHP0bJdNEjV1ZcPKGtFblmKkcuw_aFTj6XmYBd_em7D6VjPn6d2lPiNDgds-Fdsw1DW6wR4NqB6BzjYEe3DigjlGHjDGsmTLD/s1600/IMG_5697.JPG&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;480&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1QDW02j3p2IVNheDiNUCgAqVkMqssAZTC69WLLcwwVKHzHP0bJdNEjV1ZcPKGtFblmKkcuw_aFTj6XmYBd_em7D6VjPn6d2lPiNDgds-Fdsw1DW6wR4NqB6BzjYEe3DigjlGHjDGsmTLD/s1600/IMG_5697.JPG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Buenos días a todos desde Las Vegas! Después de un intenso viaje, no sin alguna complicación técnica gracias a las aduanas de EEUU que me hicieron perder la conexión con mi vuelo, ya estoy listo y con las demos funcionando al 100% para mañana Black Hat USA 2014.&lt;br /&gt;
&lt;br /&gt;
Los que vayáis a asistir, estaré en el &lt;b&gt;Arsenal&lt;/b&gt; de&amp;nbsp;&amp;nbsp;12:45 p.m. a 3:15 p.m mostrando &lt;b&gt;WhatsApp Privacy Guard&lt;/b&gt;, con las últimas modificaciones para que sea completamente funcional con el nuevo protocolo de autenticación WAUTH-2.&lt;br /&gt;
&lt;br /&gt;
Además, de&amp;nbsp;&amp;nbsp;2:15 p.m. a 2:45 p.m daré una charla sobre su funcionamiento, en la que hablaré también de todos los descubrimientos que hemos ido descubriendo Pablo y yo a lo largo del último año.&lt;br /&gt;
&lt;br /&gt;
Ya iré contando... }:)</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/6616310817086161617/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/08/visita-a-black-hat-usa-2014.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/6616310817086161617'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/6616310817086161617'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/08/visita-a-black-hat-usa-2014.html' title='Visita a Black Hat USA 2014'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1QDW02j3p2IVNheDiNUCgAqVkMqssAZTC69WLLcwwVKHzHP0bJdNEjV1ZcPKGtFblmKkcuw_aFTj6XmYBd_em7D6VjPn6d2lPiNDgds-Fdsw1DW6wR4NqB6BzjYEe3DigjlGHjDGsmTLD/s72-c/IMG_5697.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-4858945534983167759</id><published>2014-06-10T01:39:00.000-07:00</published><updated>2019-03-23T12:22:46.722-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="Aplicaciones"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="iOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Móvil"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><title type='text'>WhatsApp Authentication: profundizando en WAUTH-1 y WAUTH-2</title><content type='html'>&lt;center&gt;
&lt;br /&gt;&lt;/center&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJHs0ZQ2LVAZCcRmMYib-jUyYDp5CMMeWCfhPIYb8uOfFWiaZGKec74VIHdrN4eNP5pHM6nv91KSKl0XohI9jE5OvCGqOXfEh8rtkQK_80ReVcMTOLQI96taWIq6YcfnoacCPZFh_Q3dkh/s1600/14846307689774.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;400&quot; data-original-width=&quot;735&quot; height=&quot;347&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJHs0ZQ2LVAZCcRmMYib-jUyYDp5CMMeWCfhPIYb8uOfFWiaZGKec74VIHdrN4eNP5pHM6nv91KSKl0XohI9jE5OvCGqOXfEh8rtkQK_80ReVcMTOLQI96taWIq6YcfnoacCPZFh_Q3dkh/s640/14846307689774.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
En esta segunda entrada voy a profundizar en los mecanismos de autenticación de &lt;a href=&quot;http://www.whatsapp.com/&quot;&gt;WhatsApp&lt;/a&gt;&amp;nbsp;&lt;b&gt;WAUTH-1&lt;/b&gt; y &lt;b&gt;WAUTH-2&lt;/b&gt;, ya que el mecanismo de &lt;b&gt;MD5 &lt;/b&gt;se dejó de utilizar el 24 de diciembre de 2012.&lt;br /&gt;
&lt;div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;EN QUÉ CONSISTE WAUTH-1&lt;/b&gt;&lt;/div&gt;
En&amp;nbsp;&lt;b&gt;WAUTH-1&lt;/b&gt;&amp;nbsp;en el momento de registrar el teléfono en el servicio, cuando recibimos un SMS con un código, se genera un password en los servidores de WhatsApp que será un secreto compartido entre el teléfono y los servidores.
&lt;br /&gt;
&lt;div style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;
Cuando el teléfono trata de logarse en WhatsApp para recibir o enviar mensajes, los servidores de WhatsApp le envían un challenge de 20 bytes, que junto con el password (secreto compartido) generarán las claves RC4 y HMAC &amp;nbsp;de la sesión. La forma de autenticarse es que el teléfono cifre con la clave de sesión su número de teléfono concatenado con el challenge enviado por el servidor y concatenado con el timestamp. Los servidores de WhatsApp descifraran el mensaje y verificaran que se compone del numero de telefono, el challenge enviado y un timestamp.&lt;br /&gt;
&lt;br /&gt;
Las claves de sesión RC4 y HMAC son el resultado de usar PKDBF2, con el password (secreto compartido), utilizando el challenge del servidor como&amp;nbsp;&lt;i&gt;salt&lt;/i&gt;&amp;nbsp;y SHA1 como función de hash. Se utilizan 16 iteraciones de este algoritmo y los 20 bytes mas significativos del resultado son empleados como clave RC4 (para cifrar la comunicación) y HMAC-SHA1 (para validar la integridad de los mensajes) durante la sesión establecida entre el teléfono y los servidores de WhatsApp.&lt;br /&gt;
&lt;br /&gt;
Al usar la misma password para cifrar los mensajes enviados desde el teléfono hacia los servidores y desde los servidores hacia el teléfono se produce la vulnerabilidad que comentamos en&amp;nbsp;&lt;a href=&quot;http://www.seguridadofensiva.com/2013/11/experiencia-personal-en-noconname-2013.html&quot; target=&quot;_blank&quot;&gt;NocOnName 2013&lt;/a&gt;, que permitiría revelar las conversaciones de WhatsApp.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; text-align: justify;&quot;&gt;
Cuando hicimos nuestra presentación en&amp;nbsp;&lt;a href=&quot;http://www.seguridadofensiva.com/2014/03/slides-de-nuestra-charla-whatsapp-mentiras-y-cintas-de-video-en-rootedcon-2014.html&quot; target=&quot;_blank&quot;&gt;RootedCON 2014&lt;/a&gt;&amp;nbsp;se empezó a formar un gran revuelo en las redes sociales por que WhatsApp &quot;obligaba&quot; a los usuarios de Android a actualizarse a una nueva&amp;nbsp;versión. En nuestra charla explicamos que es lo que&amp;nbsp;creíamos&amp;nbsp;que se&amp;nbsp;perseguía&amp;nbsp;con esa actualización, que no era otra cosa mas que finalizar el soporte de&amp;nbsp;&lt;b&gt;WAUTH-1&lt;/b&gt;&amp;nbsp;como autenticación y utilizar exclusivamente&amp;nbsp;&lt;b&gt;WAUTH-2&amp;nbsp;&lt;/b&gt;para todas las plataformas.&lt;/div&gt;
&lt;div style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; text-align: justify;&quot;&gt;
&lt;b&gt;EN QUE CONSISTE WAUTH-2&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;WAUTH-2&lt;/b&gt;&amp;nbsp;sigue basándose en un secreto compartido entre el teléfono móvil y los servidores de WhatsApp, el cual se genera en el momento de registrar el teléfono en WhatsApp, pero la forma de generar las claves de sesion de RC4 y de HMAC varía para solventar el problema de usar la misma clave para cifrar las comunicaciones en el cliente y en el servidor. Se sigue utilizando PKBDF2, con el secreto compartido y el challenge enviado por el servidor como salt y también se sigue utilizando como resultado los 20 bytes más significativos. Hasta aquí las partes que continuan igual que el algoritmo anterior.&lt;/div&gt;
&lt;div style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;
Lo que cambia es que se utiliza PKBDF2 cuatro veces en lugar de una vez, para generar 4 claves diferentes, se utilizan solo 2 iteraciones del algoritmo en lugar de las 16 anteriores. Cada vez que se llama a PKBDF2 se concatena al final un byte al challenge, la primera vez se concatena el byte 0x01, la segunda 0x02 y así sucesivamente hasta completar las 4 llamadas.&lt;br /&gt;
&lt;br /&gt;
De esta forma se generan &lt;b&gt;cuatro claves&lt;/b&gt; diferentes:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;La &lt;b&gt;primera &lt;/b&gt;clave se utiliza para cifrar y descifrar, mediante RC4, las conversaciones desde el teléfono hacia los servidores de WhatsApp.&lt;/li&gt;
&lt;li&gt;La &lt;b&gt;segunda &lt;/b&gt;clave se utiliza para validar la integridad de los mensajes enviados desde el teléfono hacia los servidores de WhatsApp mediante HMAC-SHA1.&lt;/li&gt;
&lt;li&gt;La &lt;b&gt;tercera &lt;/b&gt;clave se utiliza para cifrar y descifrar, mediante RC4, las conversaciones desde los servidores de WhatsApp hacia el teléfono.&lt;/li&gt;
&lt;li&gt;La &lt;b&gt;cuarta &lt;/b&gt;clave se utiliza para validad la integridad de los mensajes enviados desde los servidores de WhatsApp hacia el teléfono mediante HMAC-SHA1.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Otro punto que cambia es que a la hora de calcular el HMAC-SHA1 de los mensajes, se concatenan cuatro bytes al final del mensaje con el número de mensaje. Esto es si el mensaje que vamos a mandar es el tercero que intercambiamos se concatenan los bytes 0x00 0x00 0x00 0x03 al final del mensaje antes de calcular el HMAC-SHA1.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Pablo San Emeterio&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;a href=&quot;https://twitter.com/psaneme&quot; target=&quot;_blank&quot;&gt;@psaneme&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;
&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/4858945534983167759/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/06/whatsapp-authentication-profundizando-en-wauth-1-y-wauth-2.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/4858945534983167759'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/4858945534983167759'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/06/whatsapp-authentication-profundizando-en-wauth-1-y-wauth-2.html' title='WhatsApp Authentication: profundizando en WAUTH-1 y WAUTH-2'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJHs0ZQ2LVAZCcRmMYib-jUyYDp5CMMeWCfhPIYb8uOfFWiaZGKec74VIHdrN4eNP5pHM6nv91KSKl0XohI9jE5OvCGqOXfEh8rtkQK_80ReVcMTOLQI96taWIq6YcfnoacCPZFh_Q3dkh/s72-c/14846307689774.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-2402054507683775557</id><published>2014-06-03T01:49:00.000-07:00</published><updated>2018-07-28T08:30:05.904-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="Aplicaciones"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="iOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Móvil"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><title type='text'>WhatsApp Authentication: MD5 vs WAUTH-1 vs WAUTH-2</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2mxLgLWH4tbh29Ywx0KKTBvm34_Fk2Qzk3x1PWloOKi-xHatvEsR8icOxc_yGosNNLhviIOpTApsUnAjeIfjr9fMEubwpOQTiggtpXbT9v73tfzBbSUPcURuFoZot07zTMPLuUOYFNMgQ/s1600/whatsapp_auth.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Este es mi primer artículo en el blog de mi compañero de conferencias y amigo &lt;a href=&quot;https://twitter.com/segofensiva&quot;&gt;Jaime Sánchez&lt;/a&gt;. Nos habéis visto participar conjuntamente en distintos congresos y ahora me sumo al blog de Seguridad Ofensiva. En este caso voy a hablar de los mecanismos de autenticación que ha utilizado &lt;a href=&quot;http://www.whatsapp.com/&quot; target=&quot;_blank&quot;&gt;WhatsApp&lt;/a&gt;, sus características y consecuencias.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;La primera vez que empecé a trastear con WhatsApp fue a mediados de 2012, y desde entonces el username no ha cambiado hasta ahora. El nombre de usuario que se utiliza para logarse en WhatsApp es el número de teléfono del terminal. Esto tiene sus partes positivas y negativas. La parte positiva y creo que el motivo principal de esta decisión por parte de los desarrolladores de WhatsApp es que te aseguras que cada cuenta creada pertenece a un número de teléfono móvil. La parte negativa es que una vez conoces el número de teléfono móvil de una persona sabes cual es su username en WhatsApp.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;El password en cambio ha sufrido tres modificaciones desde mediados de 2012, cuando el password era el resultado de una función hash, &lt;/span&gt;&lt;b style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;MD5 &lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;concretamente, sobre un elemento ligado al terminal. La dirección MAC en el caso de IOS y el IMEI para terminales Android, Windows Phone y Symbian.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Cuando esto fue público se publicaron varios ataques como el &lt;/span&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=0YbV3Xex42I&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Espía WhatsApp&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt; y el &lt;/span&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=Vq-P77UJAfo&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Rompe-parejas&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt; que se podían realizar al juntar este tipo de autenticación con APIs como &lt;/span&gt;&lt;a href=&quot;https://github.com/tgalal/yowsup&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot; target=&quot;_blank&quot;&gt;yowsup&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&amp;nbsp;o &lt;/span&gt;&lt;a href=&quot;https://github.com/venomous0x/WhatsAPI&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;WhatsAPI&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;. Con un escaneo de una red Wifi se podía obtener resultados como los de la imagen inferior, con las direcciones MAC de los iPhone a los que los usuarios les suelen poner el nombre del propietario.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHoMHFFiLZJa86IL8wUInqoD_s_Xf2UeWF69zPlMdZrrRycmC2WdFdDtXq8mzL8VQmX8GliU7FqfV_1b7-GjKywoNs00v6jrxmsPfh9lccfZ15Hf5JxBQuPvFPc24xh1xtOfe1pIocfH0/s1600/mac3.png&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;284&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHoMHFFiLZJa86IL8wUInqoD_s_Xf2UeWF69zPlMdZrrRycmC2WdFdDtXq8mzL8VQmX8GliU7FqfV_1b7-GjKywoNs00v6jrxmsPfh9lccfZ15Hf5JxBQuPvFPc24xh1xtOfe1pIocfH0/s1600/mac3.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;WhatsApp decidió cambiar la forma de autenticarse y el 24 de Diciembre de 2012 dejó de dar soporte a la autenticación basada en &lt;/span&gt;&lt;b style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;MD5 &lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;y se forzó a todos los usuarios de WhatsApp a actualizar la aplicación y migrarse al nuevo sistema de autenticación. Esta autenticación la llamamos &lt;/span&gt;&lt;b style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;WAUTH-1&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;, por que en la última actualización de WhatsApp se envía un texto que indica &lt;/span&gt;&lt;b style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;WAUTH-2&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt; como se puede ver en la imagen inferior.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXrXG22bzAa6pL308XHTDagD61TYULbqLJiBrrW9FVGbXdpQWh_TPtyV4Ejv-sWIyDNEnM45gRld_tDTjTpzThANzfhE7F8suTOBl6TgBkaMcfcdwOFbiYoHcNk4poWbl3HVCSjHqI5PU/s1600/screenshot2.png&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;269&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXrXG22bzAa6pL308XHTDagD61TYULbqLJiBrrW9FVGbXdpQWh_TPtyV4Ejv-sWIyDNEnM45gRld_tDTjTpzThANzfhE7F8suTOBl6TgBkaMcfcdwOFbiYoHcNk4poWbl3HVCSjHqI5PU/s1600/screenshot2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;En ninguna parte hay documentación técnica a este respecto. Sin embargo en &lt;b&gt;WAUTH-1&lt;/b&gt; no hay ningún texto, como se puede ver en la siguiente imagen:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4XY3hMZFDuQjPy_rUKd0JtrmP3LAl0unh7p6MUPoDauwDxy1Dx4VgYeAVsRf91BouKGXEwlaqjsbG0nINaiPhA0JX8vWO0_G8e-6V3b9qO9R-RheKu0ispCOXUnNF2kCSiwlmgPOb7UI/s1600/screenshot2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;218&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4XY3hMZFDuQjPy_rUKd0JtrmP3LAl0unh7p6MUPoDauwDxy1Dx4VgYeAVsRf91BouKGXEwlaqjsbG0nINaiPhA0JX8vWO0_G8e-6V3b9qO9R-RheKu0ispCOXUnNF2kCSiwlmgPOb7UI/s1600/screenshot2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;En WhatsApp se generan 4 claves. Dos son para la sesión del teléfono y otras dos para la sesión del servidor. Las dos claves son una la clave RC4 utilizada para cifrar los mensajes y la otra la clave empleada para generar un HMAC del mensaje a enviar.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;En la próxima entrega entraremos más en detalle sobre el funcionamiento de &lt;b&gt;WAUTH-1&lt;/b&gt; y &lt;b&gt;WAUTH-2&lt;/b&gt;. Mientras tanto si queréis conocer más detalles, os recomiendo echar un vistazo a nuestra presentación de RootedCON 2014, llamada &lt;a href=&quot;http://www.slideshare.net/segofensiva/whatsapp-mentiras-y-cintas-de-video-rootedcon-2014&quot;&gt;WhatsApp: mentiras y cintas de vídeo&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;Pablo San Emeterio&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;&lt;a href=&quot;https://twitter.com/psaneme&quot; target=&quot;_blank&quot;&gt;@psaneme&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;&quot;&gt;
&lt;/span&gt;

&lt;!-- Blogger automated replacement: &quot;https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F2.bp.blogspot.com%2F-YV3b1VK0-jQ%2FU1YabZj73WI%2FAAAAAAAAAUo%2FLOMw8BdHtBY%2Fs1600%2Fmac3.png&amp;amp;container=blogger&amp;amp;gadget=a&amp;amp;rewriteMime=image%2F*&quot; with &quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHoMHFFiLZJa86IL8wUInqoD_s_Xf2UeWF69zPlMdZrrRycmC2WdFdDtXq8mzL8VQmX8GliU7FqfV_1b7-GjKywoNs00v6jrxmsPfh9lccfZ15Hf5JxBQuPvFPc24xh1xtOfe1pIocfH0/s1600/mac3.png&quot; --&gt;&lt;!-- Blogger automated replacement: &quot;https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F2.bp.blogspot.com%2F-UUE9YPytnBE%2FU1d1u65Cd8I%2FAAAAAAAAAU4%2FUm-_VM49Ljc%2Fs1600%2Fscreenshot2.png&amp;amp;container=blogger&amp;amp;gadget=a&amp;amp;rewriteMime=image%2F*&quot; with &quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXrXG22bzAa6pL308XHTDagD61TYULbqLJiBrrW9FVGbXdpQWh_TPtyV4Ejv-sWIyDNEnM45gRld_tDTjTpzThANzfhE7F8suTOBl6TgBkaMcfcdwOFbiYoHcNk4poWbl3HVCSjHqI5PU/s1600/screenshot2.png&quot; --&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/2402054507683775557/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/06/whatsapp-authentication-md5-vs-wauth-1-vs-wauth-2.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/2402054507683775557'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/2402054507683775557'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/06/whatsapp-authentication-md5-vs-wauth-1-vs-wauth-2.html' title='WhatsApp Authentication: MD5 vs WAUTH-1 vs WAUTH-2'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2mxLgLWH4tbh29Ywx0KKTBvm34_Fk2Qzk3x1PWloOKi-xHatvEsR8icOxc_yGosNNLhviIOpTApsUnAjeIfjr9fMEubwpOQTiggtpXbT9v73tfzBbSUPcURuFoZot07zTMPLuUOYFNMgQ/s72-c/whatsapp_auth.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-2342679131219726800</id><published>2014-05-28T00:43:00.000-07:00</published><updated>2014-05-28T01:35:11.580-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="iOS"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Móvil"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacidad"/><title type='text'>Seguridad en dispositivos móviles y smartphones: la gran preocupación de las empresas </title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;http://www.sightmax.com/images/default-source/SightMaxImages/mobile_product_header.png&quot; height=&quot;175&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;En las últimas semanas he tenido la oportunidad de hablar en un par de charlas acerca&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt; de la seguridad en smartphones y aplicaciones móviles, y de como hemos vivido una revolución de tecnología sin precedentes. Se trata de una revolución que comenzó con los primeros teléfonos móviles multimedia y los denominados netbooks, aunque no ha sido hasta la aparición de los smartphones y tables cuando los usuarios han comenzado a aprovechar e incluir en su vida cotidiana el enorme potencial de estas tecnologías.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;Estos dispositivos móviles han evolucionado, respondiendo a la demanda de cantidad y calidad de funcionalidades, servicios y aplicaciones, convirtiéndose en pequeños y sofisticados ordenadores, que almacenan información privada y confidencial acerca de nuestros hábitos de vida, nuestras relaciones personales y nuestro trabajo.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;¿Piensas que el caso del robo de las fotos a &lt;a href=&quot;http://gizmodo.com/5841742/how-did-scarlett-johanssons-phone-get-hacked&quot;&gt;Scarlett Johansson&lt;/a&gt;, en las que aparece desnuda, es un hecho aislado? Muchas otras actrices como &lt;a href=&quot;http://hollywoodlife.com/2011/09/14/mila-kunis-hacked-nude-pics-justin-timberlake/&quot;&gt;Mila Kunis&lt;/a&gt;, &lt;a href=&quot;http://www.vulture.com/2011/03/hollywood_hacker_ring.html&quot;&gt;Vanessa Hudgens&lt;/a&gt; o &lt;a href=&quot;http://www.trendhunter.com/trends/miley-cyrus-private-pics&quot;&gt;Miley Cirus&lt;/a&gt; han sufrido este tipo de ataques donde los delincuentes han logrado acceder a sus teléfonos móviles y los datos que tenían almacenados. No se trata sólo de fotos, sino también documentos, direcciones y muchos datos personales y de acceso a contenidos sensibles, como entidades bancarias, lo que podría estar expuesto.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.techweekeurope.co.uk/wp-content/uploads/2013/05/Mobile-malware-virus-security-Shutterstock-Julien-Tromeur.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.techweekeurope.co.uk/wp-content/uploads/2013/05/Mobile-malware-virus-security-Shutterstock-Julien-Tromeur.jpg&quot; height=&quot;90&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;El auge de estos dispositivos, los han convertido en el principal objetivo de los cibercriminales a la hora de dirigir sus ataques desde la aparición del primer&amp;nbsp; código malicioso en 2004, y esta tendencia no parece que vaya a variar a medio o largo plazo. Según las &lt;a href=&quot;http://www.kaspersky.com/about/news/virus/2014/Mobile-malware-evolution-3-infection-attempts-per-user-in-2013&quot;&gt;últimas estadísticas publicadas&lt;/a&gt;, solamente en 2013 se detectaron 143.211 programas maliciosos para smartphones y tableta.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Esto no es de extrañar, dado que el tráfico generado por estos dispositivos en Internet supera los 86 exabytes al año y al aumento del comercio electrónico a través de Internet, y por extensión a los smartphones, desde donde el consumidor realiza cada día más transacciones comerciales. Sólo en 2010 se calculaba que el volumen de operaciones y transacciones comerciales rondaba los 170 millones, y se estima que esta cifre alcance los 630 millones de operaciones y transacciones a lo largo del año en curso.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;&quot;&gt;&lt;br /&gt;Pero, ¿qué tipo de ataques son más comúnmente realizados por estos ciberdelicuentes? Las actividades más comunes incluyen lo siguiente: &lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Envío de mensajes de texto (SMS) a números Premium&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Descarga o instalación de archivos o aplicaciones no solicitadas&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Geolocalización en segundo plano de la ubicación del usuario&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Presuntos antivirus móviles que en realidad carecen de funcionalidad alguna&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Conexión a portales web, sin interactuación de la víctima, para aumentar tráfico&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Monitorización de las actividades y el sistema para realizar fraudes bancarios&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Robo de información personal como archivos, contactos, fotos y otros datos privados&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;&quot;&gt;Aunque más de 98% de aplicaciones maliciosas y malware tienen como foco el sistema Android, no debemos olvidar que iOS o Blackberry pueden también sufrir este tipo de ataques, y también están expuestos a los mismos riesgos. No olvidemos también que vulnerabilidades como &lt;a href=&quot;http://www.seguridadofensiva.com/2014/04/mas-alla-de-heartbleed-y-https_10.html&quot;&gt;Heartbleed&lt;/a&gt; pueden conllevar un impacto global, afectando tanto a dispositivos móviles, como a sistemas de almacenamiento, mensajería y servidores públicos en Internet.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaEZo0HDHgcHRQgO34HMOjV5HUSCsE1torRZYMB8rMHWjHin_Dip1odnHJGhgcbdYPeYFn0PHGExZZPqVGyhrAsboAoe6y8FzTCYrMJOGJwbzUgO9D7VRi6sUdZZFoQ8llSX_yHdK0wgEE/s1600/stats.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;//images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaEZo0HDHgcHRQgO34HMOjV5HUSCsE1torRZYMB8rMHWjHin_Dip1odnHJGhgcbdYPeYFn0PHGExZZPqVGyhrAsboAoe6y8FzTCYrMJOGJwbzUgO9D7VRi6sUdZZFoQ8llSX_yHdK0wgEE/s1600/stats.png&amp;amp;container=blogger&amp;amp;gadget=a&amp;amp;rewriteMime=image/*&quot; width=&quot;400&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: xx-small;&quot;&gt;Cuota de mercado correspondiente a Diciembre de 2013&lt;/span&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt; &lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;&quot;&gt; Además, debemos tener en cuenta un factor que reforzará esta tendencia de crecimiento vertiginoso de amenazas y malware móvil: &lt;a href=&quot;http://es.wikipedia.org/wiki/BYOD&quot;&gt;BYOD (Bring Your Own Device)&lt;/a&gt;. Un fenómeno que está creciendo en varias regiones del mundo y que tiene directa relación con el desarrollo de dispositivos móviles cada vez más avanzados. De hecho, siete de cada diez empresas españolas ya soportan alguna modalidad de BYOD.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Dado que BYOD permite a los empleados de una compañía llevar consigo y utilizar equipos personales como portátiles, teléfonos inteligentes y tabletas dentro de un entorno corporativo, podríamos enfrentarnos en un corto espacio de tiempo a un serio problema de seguridad si no se adoptan las medidas necesarias.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Los planes de seguridad globales de vuestra empresa, la estrategia y el marco legal deberán adaptarse a este nuevo escenario para afrontar la era Post-PC.&lt;/span&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/2342679131219726800/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/05/seguridad--dispositivos-moviles-y-smartphones-la-gran-preocupacion-de-las-empresas.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/2342679131219726800'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/2342679131219726800'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/05/seguridad--dispositivos-moviles-y-smartphones-la-gran-preocupacion-de-las-empresas.html' title='Seguridad en dispositivos móviles y smartphones: la gran preocupación de las empresas '/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-5483586932331744017</id><published>2014-05-26T00:55:00.001-07:00</published><updated>2014-05-26T01:01:31.480-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="seguridad bancaria"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><title type='text'>Cómo obtener actualizaciones oficiales de seguridad para Windows XP hasta Abril del 2019</title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;http://www4.pcmag.com/media/images/423139-windows-xp.jpg?thumb=y&quot; height=&quot;360&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; text-align: justify;&quot;&gt;Como todos sabéis, después del 8 de abril de 2014 ya &lt;a href=&quot;http://windows.microsoft.com/es-es/windows/end-support-help&quot;&gt;no hay más actualizaciones de seguridad para Windows XP&lt;/a&gt;, ni parches para errores no ligados a la seguridad, ni opciones de soporte, gratuitas ni de pago tampoco, ni actualizaciones de contenido técnico en la Web.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Esto se debe a que en 2002 Microsoft presentó su política de&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://support.microsoft.com/lifecycle/?ln=es-es&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Ciclo de Vida de Soporte&lt;/a&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;, desarrollada a partir de los comentarios de &amp;nbsp;clientes con el fin de ofrecer una mayor transparencia y previsibilidad a la hora de explicar las opciones de soporte para nuestros productos. Siguiendo esta política, los productos para Empresa y Desarrolladores, entre los cuales se incluyen los sistemas operativos Windows y Microsoft Office, disponen de un mínimo de 10 años de soporte (5 de soporte estándar y 5 más de soporte extendido) en el nivel de service pack soportado.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.microsoft.com/global/en-us/windows/business/PublishingImages/retiringXP/EOS_prompt_eng.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.digitaltrends.com/wp-content/uploads/2014/01/atm-windows-xp.png&quot; height=&quot;133&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;b&gt;Lo ideal sería dejar de usar Windows XP&lt;/b&gt; y pasar a alguna versión más actual que todavía tenga soporte, aunque no sea la más reciente, o incluso dar una oportunidad a otros sistemas operativos, pero como todos conocemos, XP está instalado en gran diversidad de máquinas cuya migración supondría un gran coste,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;como con cajeros automáticos bancarios, de los que afectará a casi a un 95%, según &lt;/span&gt;&lt;a href=&quot;http://www.ncr.com/&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;NCR&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Pero existe una excepción para este fin de soporte: Windows Embedded POSReady, que mantendrá el soporte hasta el año 2019, y Windows Embedded for Point of Service, que aguantará hasta 2016.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;http://blogs.msdn.com/blogfiles/bfridley/WindowsLiveWriter/WindowsEmbeddedPOSReady2009_DC11/image_thumb_2.png&quot; height=&quot;286&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Lo interesante de este tema es que &lt;b&gt;Windows Embedded POSReady 2009 está basado en Windows XP Service Pack 3&lt;/b&gt;, por lo que acpedtualizaciones de seguridad que están publicando son las mismas que Microsoft hubiera publicado para Windows XP. Si lograramos obtener este tipo de actualizaciones, podríamos ganar otros cinco años de actualizaciones oficiales para nuestros sistemas, pero no podemos directamente descargarlas y tratar de instalarlas, dadas las comprobaciones que se realizan previamente.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Utilizaremos un truco que &lt;b&gt;funciona para sistemas de 32 bits de Windows XP SP3&lt;/b&gt; (por el momento no se puede realizar para 64 bits). A pesar de las similitudes entre POSReady y Windows XP, es recomendable realizar una copia de seguridad de nuestros datos, por si ocurriera alguna incompatibilidad.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Lo único que necesitaremos hacer es añadir los siguientes valores al registro de Windows XP:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Windows Registry Editor Version 5.00&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;i&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[HKEY_LOCAL_MACHINE\SYSTEM\WPA\PosReady]&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;&lt;/b&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&quot;Installed&quot;=dword:00000001&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Si lo preferís, podeis descargar un fichero de registro que incorporará ese valor a nuestro sistema: &lt;a href=&quot;http://www.datafilehost.com/d/0cde69c2&quot;&gt;xp-security-updates.zip&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Quizá esta no sea una solución oficial, pero es mejor que tener un sistema desactualizado y vulnerable en nuestra organización :)&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/5483586932331744017/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/05/como-obtener-actualizaciones-oficiales-de-seguridad-para-Windows-XP-hasta-Abril-del-2019.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/5483586932331744017'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/5483586932331744017'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/05/como-obtener-actualizaciones-oficiales-de-seguridad-para-Windows-XP-hasta-Abril-del-2019.html' title='Cómo obtener actualizaciones oficiales de seguridad para Windows XP hasta Abril del 2019'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-5842218586721841607</id><published>2014-05-22T01:07:00.000-07:00</published><updated>2014-05-22T01:33:37.387-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="Anonimato"/><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="NuitDuHack"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacidad"/><category scheme="http://www.blogger.com/atom/ns#" term="Snapchat"/><category scheme="http://www.blogger.com/atom/ns#" term="Viber"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><title type='text'>Estaré de ponente, otro año más, en Nuit du Hack</title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc6fXFYQktPMfSzG6BkWPw6__i2-Khx65Ge2oX3bhzSrc-_hQzIb8PTDs008w6y0iTuCqLorRlJKIZOErkpltZVC3ZD39pMsEhxCUJ7y_vKHSYgZ6TryZRTe7AMn-H4AsBXQtNg8lJJAZ7/s1600/ndh2k14.png&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Por segundo año consecutivo, tengo el placer de anunciar que estaré como ponente para dar una charla en &lt;/span&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.nuitduhack.com/&quot; target=&quot;_blank&quot;&gt;Nuit du Hack&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;. El evento se desarrollará los días &lt;b&gt;28-29 de Junio&lt;/b&gt; en el &lt;/span&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.disneylandparis-business.com/en/conferences_meetings/disneys_hotel_new-york_convention_center&quot; target=&quot;_blank&quot;&gt;Disney&#39;s Hotel New York® Convention Center&lt;/a&gt;, que se encuentra en Disneyland París.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Para quien no lo conozca aún, &lt;/span&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;la &lt;a href=&quot;http://www.nuitduhack.com/&quot; target=&quot;_blank&quot;&gt;Nuit du Hack&lt;/a&gt; &lt;/span&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;comenzó sus andaduras en el 2003 por un equipo de personas, que se unieron bajo el nombre de &quot;&lt;/span&gt;&lt;b style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;HackerzVoice&lt;/b&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&quot;, e inspiraron en el famoso y más grande evento de hacking de EE.UU., llamado &lt;/span&gt;&lt;b style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Defcon&lt;/b&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&amp;nbsp;Es
 uno de los eventos hacker franceses más antiguos, que reune todos los 
años a profesionales y aficionados de todos los niveles, en torno a 
conferencias y diversos desafíos.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6UOH-_6Cx4KZo0wSmpcdNioIwt8YPIwaA8SZgpVG8xU9-jLMggQZ14l1B5-edBK-32dompaYguOiwBpDlxztZ6rAD2Xxyu7K2_M0St_R0morcCi1rSvn1hJH-x28U3ebDc9C9xx7NlcNf/s640/nuit2013.JPG&quot; height=&quot;150&quot; width=&quot;200&quot; /&gt; &lt;img border=&quot;0&quot; src=&quot;http://www.cnis-mag.com/wp-content/uploads/2012/07/nuit-du-hack-WN.jpg&quot; height=&quot;150&quot; width=&quot;200&quot; /&gt; &lt;img border=&quot;0&quot; src=&quot;http://www.xavbox.info/photos/ndh/2012/b-ndh-2K12-091.jpg&quot; height=&quot;150&quot; width=&quot;200&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Para todos aquellos que quieran conocer como se desarrolló el congreso el año pasado, podéis leer mi post &lt;a href=&quot;http://www.seguridadofensiva.com/2013/07/mi-experiencia-en-nuit-du-hack-2013.html&quot; target=&quot;_blank&quot;&gt;Mi experiencia en Nuit du Hack 2013&lt;/a&gt;. La verdad es que es bastante complicado mejorar los ratos que pasé allí, así como la gente que conocí, y estoy encantado de poder repetir de nuevo.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Las charlas anunciadas para esta edición son las siguientes:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;FR &lt;/i&gt;- &lt;b&gt;Break, dump &amp;amp; crash&lt;/b&gt; - &lt;a href=&quot;https://twitter.com/virtualabs&quot; target=&quot;_blank&quot;&gt;Virtualabs&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;/span&gt;FR &lt;/i&gt;- &lt;b&gt;Retro-arcades protections &amp;amp; hacking&lt;/b&gt; - CrashTest&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;EN &lt;/i&gt;- &lt;b&gt;Around the world in 80 Cons&lt;/b&gt; - &lt;a href=&quot;https://twitter.com/jaysonstreet&quot; target=&quot;_blank&quot;&gt;Jayson Street&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;EN &lt;/i&gt;- &lt;b&gt;Defeating Memory Corruption Attacks by Replication and &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;/span&gt;Diversification&lt;/b&gt; - Marc Nimmerrichter&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;FR &lt;/i&gt;- &lt;b&gt;Use CNC and 3D to cut your own mechanical keys&lt;/b&gt; - Mr Jack&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;EN &lt;/i&gt;- &lt;b&gt;Take care of your inputs &lt;/b&gt;- &lt;a href=&quot;https://twitter.com/zackhimself&quot; target=&quot;_blank&quot;&gt;Zakaria Rachid&lt;/a&gt; &amp;amp; &lt;a href=&quot;https://twitter.com/BBerastegui&quot; target=&quot;_blank&quot;&gt;Borja Berástegui&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;FR &lt;/i&gt;- &lt;b&gt;A common weakness in RSA signatures: extracting public keys from&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt;communications and embedded devices&lt;/b&gt; - &lt;a href=&quot;https://twitter.com/nono2357&quot; target=&quot;_blank&quot;&gt;Renaud Lifchitz&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;EN &lt;/i&gt;- &lt;b&gt;Combating Evasive Malware&lt;/b&gt; - &lt;a href=&quot;https://twitter.com/marco_cova&quot; target=&quot;_blank&quot;&gt;Marco Cova&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;FR &lt;/i&gt;- &lt;b&gt;Coucou, tu veux voir ma domotique ?&lt;/b&gt; - Vorex&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;EN &lt;/i&gt;- &lt;b&gt;Security Threats for Instant Messaging Platforms&lt;/b&gt; - &lt;a href=&quot;https://twitter.com/segofensiva&quot; target=&quot;_blank&quot;&gt;Jaime Sanchez&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;FR &lt;/i&gt;- &lt;b&gt;Using a basic bathroom scale to remotly follow a behive&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt; production&lt;/b&gt; - &lt;a href=&quot;https://twitter.com/Electrolab_Fr&quot; target=&quot;_blank&quot;&gt;Electrolab&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;FR &lt;/i&gt;- &lt;b&gt;La tête dans les nuages&lt;/b&gt; - Matthieu Bouthors&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;i&gt;FR &lt;/i&gt;- &lt;b&gt;Keynote &lt;/b&gt;- &lt;a href=&quot;https://twitter.com/bayartb&quot; target=&quot;_blank&quot;&gt;Benjamin Bayart&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;Este año espero poder sentarme de nuevo a jugar al CTF durante unas horas después de dar mi charla. Además, me han comentado que también se realizará un Bug Bounty durante la conferencia, con una bolsa de premios de 5.000€.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;http://korben.info/wp-content/uploads/2011/06/5848368672_6d3a03b5cf_b.jpg&quot; height=&quot;428&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Si alguien está por allí, que no dude en acercarse a saludar }:)&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/5842218586721841607/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/05/estare-como-ponente-en-nuit-du-hack-2014.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/5842218586721841607'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/5842218586721841607'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/05/estare-como-ponente-en-nuit-du-hack-2014.html' title='Estaré de ponente, otro año más, en Nuit du Hack'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc6fXFYQktPMfSzG6BkWPw6__i2-Khx65Ge2oX3bhzSrc-_hQzIb8PTDs008w6y0iTuCqLorRlJKIZOErkpltZVC3ZD39pMsEhxCUJ7y_vKHSYgZ6TryZRTe7AMn-H4AsBXQtNg8lJJAZ7/s72-c/ndh2k14.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-3288629915480280285</id><published>2014-04-30T02:05:00.000-07:00</published><updated>2014-04-30T02:05:46.941-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Defcon"/><category scheme="http://www.blogger.com/atom/ns#" term="Entrevista"/><category scheme="http://www.blogger.com/atom/ns#" term="ESET Security Forum"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Videos"/><title type='text'>Entrevista personal en el blog del equipo de ESET</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicI-TYQGSV3NFfnIiedR1a2JKtfjuPAykHHHzAI73OT9ABirG__kKf2aHFijmTyrna7BxV1l9BV2sM-RGBN7-HkoQY00WLf0D41FNAtawkOWb1OhAK42YjXFCBWsVKX3gWbbi5B3iXeTR1/s1600/camera.png&quot; height=&quot;308&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Como todos sabéis,mantengo una muy buena relación con mi amigo y compañero &lt;a href=&quot;https://twitter.com/JosepAlbors&quot; target=&quot;_blank&quot;&gt;Josep Albors&lt;/a&gt;, que conozco de viaje el año pasado en las Vegas, cuando me hizo una pequeña entrevista para el &lt;a href=&quot;http://blogs.protegerse.com/laboratorio/&quot; target=&quot;_blank&quot;&gt;blog de ESET&lt;/a&gt; sobre mi charla en Defcon &lt;a href=&quot;http://www.slideshare.net/segofensiva/defcon-21-building-an-android-ids-on-network-level&quot; target=&quot;_blank&quot;&gt;Building an Android IDS on Network Level&lt;/a&gt;, que podéis leer &lt;a href=&quot;http://blogs.protegerse.com/laboratorio/2013/08/12/espanoles-en-la-defcon-construyendo-un-ids-en-android-a-nivel-de-red/&quot; target=&quot;_blank&quot;&gt;aquí&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Unos meses más tarde, tuve la suerte de participar en el &lt;a href=&quot;http://www.seguridadofensiva.com/2013/10/participare-en-el-ii-eset-security-forum.html&quot; target=&quot;_blank&quot;&gt;II ESET Security Forum&lt;/a&gt;, un foro de carácter meramente informativo y social donde se reune a lo mejor de este país en cuanto a seguridad informática se refiere y que día a día trabajan y lidian con estas temáticas desde sus respectivas responsabilidades.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;En la primera parte se habló de las filtraciones y revelaciones de secretos realizadas por miembros de Anonymous o el excontratista de la NSA, &lt;a href=&quot;http://es.wikipedia.org/wiki/Edward_Snowden&quot; target=&quot;_blank&quot;&gt;Edward Snowden&lt;/a&gt;. La segunda parte empezó tras un breve descanso, que los ponentes aprovecharon para reponer fuerzas y hacer un poco de networking con los asistentes, para luego hablar de las amenazas que afectan a todo tipo de dispositivos conectados a lo que se conoce como el &lt;a href=&quot;http://es.wikipedia.org/wiki/Internet_de_las_Cosas&quot; target=&quot;_blank&quot;&gt;Internet de las cosas&lt;/a&gt;. Podéis ver ya los &lt;a href=&quot;http://www.seguridadofensiva.com/2013/12/videos-del-ii-eset-security-forum.html&quot; target=&quot;_blank&quot;&gt;vídeos del evento&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Después del evento, y antes de dejarnos disfrutar de esos catering que dejan huella a la gente :), nos propusieron una entrevista más personal, sobre nuestros inicios en el mundillo de la seguridad informática y lo que más nos gusta de nuestro trabajo.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Os dejo el &lt;a href=&quot;http://blogs.protegerse.com/laboratorio/2014/04/24/jaime-sanchez-me-gusta-tener-la-oportunidad-de-afrontar-grandes-retos/&quot; target=&quot;_blank&quot;&gt;vídeo&lt;/a&gt;:&lt;/span&gt;&lt;br /&gt;
&lt;center&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;360&quot; src=&quot;//www.youtube.com/embed/YyaIc83BO3E&quot; width=&quot;640&quot;&gt;&lt;/iframe&gt;&lt;/center&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/3288629915480280285/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/04/entrevista-personal-en-el-blog-del-equipo-de-ESET.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/3288629915480280285'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/3288629915480280285'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/04/entrevista-personal-en-el-blog-del-equipo-de-ESET.html' title='Entrevista personal en el blog del equipo de ESET'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicI-TYQGSV3NFfnIiedR1a2JKtfjuPAykHHHzAI73OT9ABirG__kKf2aHFijmTyrna7BxV1l9BV2sM-RGBN7-HkoQY00WLf0D41FNAtawkOWb1OhAK42YjXFCBWsVKX3gWbbi5B3iXeTR1/s72-c/camera.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-8980551582961689191</id><published>2014-04-20T23:12:00.000-07:00</published><updated>2014-04-20T23:12:13.123-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonimato"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacidad"/><category scheme="http://www.blogger.com/atom/ns#" term="Rooted2014"/><category scheme="http://www.blogger.com/atom/ns#" term="Rootedcon"/><category scheme="http://www.blogger.com/atom/ns#" term="Snapchat"/><category scheme="http://www.blogger.com/atom/ns#" term="Viber"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><title type='text'>A vueltas con la localización: Viber, WhatsApp y sus leaks</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTCOabwHKdknNDGOWW2AxNEUkCFDSNZZfVGGa_wUARZmxqoaLwYYj1fyWagTAdfeullu5-dScg7URwOPl8ri0T-VdOzKBPb7rBWBWHNuwg3hgd5_Qckn8KhoRJRQzPYhRhy7nnkvqvBeIG/s1600/viber.png&quot; height=&quot;282&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Continuando con los últimos errores descubiertos en la aplicación de &lt;a href=&quot;http://www.whatsapp.com/&quot; target=&quot;_blank&quot;&gt;WhatsApp&lt;/a&gt;, unos unos &lt;a href=&quot;http://www.unhcfreg.com/#!Do-not-share-your-location-with-your-friends-on-WhatsApp-until-this-issue-is-fixed/c5rt/1B0FC807-60D3-46B2-90F3-8556B1084CE5&quot; target=&quot;_blank&quot;&gt;investigadores de la Universidad de New Hampshire&lt;/a&gt; han detallado paso por paso el procedimiento que realizada WhatsApp cada vez que compartimos una ubicación, mostrando que al compartir una ubicación entre dos usuarios, la aplicación necesita en primer lugar ubicarlos en &lt;a href=&quot;https://maps.google.com/&quot; target=&quot;_blank&quot;&gt;Google Maps&lt;/a&gt; dentro de una ventana de la propia aplicación.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;WhatsApp obtiene la ubicación y miniaturiza una imagen del propio Google Maps para compartirlo como el icono del mensaje, pero desafortunadamente WhatsApp descarga esta imagen a través de un canal no seguro, sin utilizar SSL, lo cual implica que podría ser descubierto durante un ataque man-in-the-middle:&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;http://www.poderpda.com/wp-content/uploads/2014/04/WhatsApp-ubicacion.jpg&quot; height=&quot;538&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;

&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Este mismo error también lo comete la gente de &lt;a href=&quot;http://www.viber.com/&quot; target=&quot;_blank&quot;&gt;Viber&lt;/a&gt;. Durante nuestra charla de &lt;b&gt;&lt;a href=&quot;http://www.slideshare.net/segofensiva/whatsapp-mentiras-y-cintas-de-video-rootedcon-2014&quot; target=&quot;_blank&quot;&gt;WhatsApp: mentiras y cintas de vídeo&lt;/a&gt;&lt;/b&gt;, que mostramos &lt;a href=&quot;https://twitter.com/psaneme&quot; target=&quot;_blank&quot;&gt;Pablo&lt;/a&gt; y &lt;a href=&quot;https://twitter.com/segofensiva&quot; target=&quot;_blank&quot;&gt;yo&lt;/a&gt; en &lt;a href=&quot;http://www.rootedcon.es/&quot; target=&quot;_blank&quot;&gt;RootedCON&lt;/a&gt; 2014, mostramos que también era posible capturar los datos de localización y los ficheros que se comparten entre dos usuarios, debido a que se envían en claro sin utilizar ningún canal seguro.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Esto, de la misma forma que en el caso de WhatsApp, nos permitiría interceptar esta información con un sencillo ataque man-in-the-middle o utilizando un Rogue AP:&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAfLsv2-q4J3c1NzAHSkcN8p76-gCT30AaRqeyUJZUxXgmPMQa5VyFay756aXYVZo-NqFAG_r4-uKuEFONSlzjn2KBwZBmmORw_AYJGPhE6iCc8lKN_eS6prO8iJWJwZS0x5K0q0Jzch7Z/s1600/viber-location-rooted.png&quot; height=&quot;418&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Si queréis conocer más detalles del funcionamiento de este tipo de ataques y el funcionamiento interno de aplicaciones como &lt;a href=&quot;http://www.viber.com/&quot; target=&quot;_blank&quot;&gt;Viber&lt;/a&gt;, &lt;a href=&quot;http://www.snapchat.com/&quot; target=&quot;_blank&quot;&gt;Snapchat&lt;/a&gt;, &lt;a href=&quot;http://www.whatsapp.com/&quot; target=&quot;_blank&quot;&gt;WhatsApp&lt;/a&gt; o cualquier otra mensajería, os recomiendo echar un vistazo a las diapositivas de nuestra charla:&lt;/span&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;486&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://www.slideshare.net/slideshow/embed_code/32098564&quot; style=&quot;border-width: 1px 1px 0; border: 1px solid #CCC; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;597&quot;&gt; &lt;/iframe&gt; &lt;/span&gt;&lt;/center&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/8980551582961689191/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/04/a-vueltas-con-la-localizacion-Viber-WhatsApp-y-sus-leaks.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/8980551582961689191'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/8980551582961689191'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/04/a-vueltas-con-la-localizacion-Viber-WhatsApp-y-sus-leaks.html' title='A vueltas con la localización: Viber, WhatsApp y sus leaks'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTCOabwHKdknNDGOWW2AxNEUkCFDSNZZfVGGa_wUARZmxqoaLwYYj1fyWagTAdfeullu5-dScg7URwOPl8ri0T-VdOzKBPb7rBWBWHNuwg3hgd5_Qckn8KhoRJRQzPYhRhy7nnkvqvBeIG/s72-c/viber.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-4085357686223617788</id><published>2014-04-14T00:13:00.000-07:00</published><updated>2014-04-14T00:16:13.190-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="iPhone"/><category scheme="http://www.blogger.com/atom/ns#" term="Móvil"/><category scheme="http://www.blogger.com/atom/ns#" term="Rootedcon"/><category scheme="http://www.blogger.com/atom/ns#" term="Shmoocon"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><title type='text'>Crash remoto de WhatsApp para iPhone en versiones &lt; a 2.11.7</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;http://www.hardware-360.com/wp-content/uploads/2014/04/whatsapp-crash.jpg&quot; height=&quot;378&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Como todos sabéis, el los últimos meses, tanto &lt;a href=&quot;https://twitter.com/psaneme&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Pablo&lt;/a&gt; como &lt;a href=&quot;https://twitter.com/segofensiva&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;yo&lt;/a&gt;, hemos estado investigando sobre diferentes clientes de mensajería instantánea para móviles, y poniendo el foco sobre &lt;a href=&quot;http://www.whatsapp.com/?l=es&quot;&gt;WhatsApp&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Entre los diferentes descubrimientos que hicimos, nos dimos cuenta de las &lt;a href=&quot;http://www.elmundo.es/tecnologia/2013/11/30/5298812c61fd3d045c8b458b.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;inseguridad que presentaba el uso de RC4 en el cifrado de mensajes&lt;/a&gt;, la posibilidad de poder &lt;a href=&quot;http://www.hojaderouter.com/seguridad/falsificar-mensajes-whatsapp/12460&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;modificar el remitente de forma transparente&lt;/a&gt;, y mucho más, así que nos planteamos diseñar un programa, que bautizamos como &lt;a href=&quot;http://www.hojaderouter.com/seguridad/dos-espanoles-demuestran-que-whatsapp-no-es-seguro-y-le-anaden-un-blindaje-a-prueba-de-espias/8007&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;WhatsApp Privacy Guard&lt;/a&gt;, que fuera capaz de añadir diferentes capas de seguridad a la aplicación, usando cifrado más seguro, opciones de anonimato o servidores propios de mensajería XMPP.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Mientras&amp;nbsp;estábamos&amp;nbsp;haciendo las diferentes pruebas con el cifrado adicional, además, nos dimos&amp;nbsp;cuenta de que el podíamos generar un crash en la aplicación si el destinatario final de los mensajes con cifrado no estaba conectado al sistema.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Dentro de nuestra presentación &lt;a href=&quot;http://www.slideshare.net/segofensiva/whatsapp-mentiras-y-cintas-de-video-rootedcon-2014&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;WhatsApp: mentiras y cintas de vídeo&lt;/a&gt;, del congreso &lt;a href=&quot;http://www.rootedcon.es/&quot;&gt;RootedCON&lt;/a&gt;, mostramos una prueba de concepto del funcionamiento del programa, en el que podemos observar el intercambio de mensajes a través de nuestra plataforma.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Nuestro programa detecta el envío de un texto en claro en WhatsApp, y utilizando la clave de sesión de RC4, descifrará el mensaje y extraerá el texto. Una vez tenemos este texto, lo cifraremos de nuevo utilizando el algoritmo que hayamos implementado, y lo vuelve a encapsular en el formalo de WhatsApp, utilizando RC4 y su clave correspondiente. Para ello también recalcularemos el HMAC del mensaje:&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid-tVxcUGJXaY8ZCLYkLLjfGR4lkzLhdS25cdEfaEndtXYns0DfixmlDQxZXPtMUHAyPpWfojSq-7XJoLRkW7SIwyz07ZLHxA1Yg1E2XKg2OYYSfke1uKYJ9SU7to0638G7Pic4jzMAz5x/s1600/whatsapp_cifrado_func.PNG&quot; height=&quot;166&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;El proceso en la parte del receptor será el inverso del que acabamos de explicar, para que pueda visualizar el mensaje original. Veámoslo en una demostración real:&lt;/span&gt;&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;480&quot; src=&quot;//www.youtube.com/embed/jRgQtFS2Ox4&quot; width=&quot;640&quot;&gt;&lt;/iframe&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;El resultado de la recepción de estos mensajes cifrados por parte de un cliente que no esté conectado al sistema, y que por tanto no es capaz de descifrar el contenido del mensaje, inicialmente nos devolvía algo así:&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0UFKJ0_KCKWQJPk4Urynpp6wmbZQcBGsf5BhxeMtI2I0p0-QEpzh_QuCVcOlW32FeXc-qDLrnKqAwNlpmVG7-kanEn2KOVJaj2_oz9zmrwr1HV58eI2gx3-Qt4m789na_bi-qYdbQHdXl/s1600/cifrado_whatsapp.PNG&quot; height=&quot;640&quot; width=&quot;366&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Pero un día nos dimos cuenta que WhatsApp nos es capaz de representar por pantalla la codificación de algunos caracteres no imprimibles, por lo que el cliente sencillamente tendrá un crash cuando abramos alguno de estos mensajes. Esto implica que cuando el receptor intente abrir la conversación donde existe un mensaje de este tipo, el programa automática se cerrará,&amp;nbsp;impidiéndole&amp;nbsp;ver la conversación, por lo que finalmente tendrá que borrarla para&amp;nbsp;recibir mensajes que sea capaz de procesar la aplicación (quizá has puesto un mensaje anteriormente del que te arrepientes y no quieres que finalmente vea :P).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Una muestra de lo que os estoy explicando la podéis ver en el siguiente mensaje:&lt;/span&gt;&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;480&quot; src=&quot;//www.youtube.com/embed/ZsNN__9XRhA&quot; width=&quot;640&quot;&gt;&lt;/iframe&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;He publicado el código necesario para enviar este tipo de mensajes en mi repositorio de &lt;a href=&quot;https://github.com/segofensiva/WhatsAppRemoteCrash&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, y en la sección de &lt;a href=&quot;http://www.seguridadofensiva.com/p/proyectos.html&quot;&gt;Proyectos&lt;/a&gt; de la página.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Necesitaréis tener instalado &lt;a href=&quot;http://www.google.com/search?q=yowsup&quot;&gt;yowsup&lt;/a&gt;, una interfaz de línea de comandos que permite enviar y recibir mensajes de WhatsApp como un cliente de móvil,&amp;nbsp;configurado con una cuenta válida, para poder enviar los mensajes.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Que os divirtáis }:)&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/4085357686223617788/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/04/crash-en-whatsapp-para-iphone-en-versiones-inferiores-a-2.11.7.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/4085357686223617788'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/4085357686223617788'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/04/crash-en-whatsapp-para-iphone-en-versiones-inferiores-a-2.11.7.html' title='Crash remoto de WhatsApp para iPhone en versiones &lt; a 2.11.7'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid-tVxcUGJXaY8ZCLYkLLjfGR4lkzLhdS25cdEfaEndtXYns0DfixmlDQxZXPtMUHAyPpWfojSq-7XJoLRkW7SIwyz07ZLHxA1Yg1E2XKg2OYYSfke1uKYJ9SU7to0638G7Pic4jzMAz5x/s72-c/whatsapp_cifrado_func.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-6518807677763233878</id><published>2014-04-10T02:59:00.002-07:00</published><updated>2014-04-10T02:59:57.894-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="IDS"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Pentesting"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacidad"/><category scheme="http://www.blogger.com/atom/ns#" term="seguridad bancaria"/><title type='text'>Más allá de Heartbleed y HTTPS</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;http://i0.wp.com/rack.0.mshcdn.com/media/ZgkyMDE0LzA0LzA5L2FkL2JsZWVkaW5naGVhLjk5NWVhLmpwZwpwCXRodW1iCTU3NXgzMjMjCmUJanBn/a138ff7f/1a5/bleeding-heart.jpg&quot; height=&quot;358&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Como todos conoceréis, hace un par de días se hacía pública una vulnerabilidad sobre &lt;a href=&quot;https://www.openssl.org/%E2%80%8E&quot;&gt;OpenSSL&lt;/a&gt;, una de las bibliotecas de criptografía más usadas, descubierta por uno de los expertos en seguridad de Google y la compañía de seguridad Codenomicon, que ha sido catalogada con el código CVE-2014-0160 y bautizada como Heartbleed, al estar vinculada a un error en la funcionalidad heartbeat de dicha librería.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Esta vulnerabilidad afecta desde la versión 1.0.1 (Marzo 2012) a la 1.0.1f (Enero 2014), y existen gran cantidad de sitios web que permiten comprobar si un sitio Web es vulnerable, como &lt;a href=&quot;http://filippo.io/Heartbleed/&quot;&gt;Heartbleed test page&lt;/a&gt;, creada por &lt;a href=&quot;http://filippo.io/&quot;&gt;Filippo Valsorda&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Lo realmente preocupante es la extensión que ha podido y puede tener esta vulnerabilidad, ya que OpenSSL es utilizado, entre otros muchos, por servidores web como Apache o nginx, que de forma conjunta abarcan el 66% de los sitios activos en Internet (de acuerdo con la &lt;a href=&quot;http://news.netcraft.com/archives/2014/04/02/april-2014-web-server-survey.html&quot;&gt;Encuesta de Netcraft sobre Servidores Web para Abril de 2014&lt;/a&gt;). Por otro lado, tambien tiene su punto entretenido, ya que es como jugar a una especie de ruleta rusa proque no sabes a ciencia cierta que se expondrá en los siguientes 64kb :)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Pero existe una parte que la gente parece que está obviando... OpenSSL también se utiliza para proteger servidores de email (SMTP, POP3 e IMAP), servidores de mensajería (XMPP), SSL VPNs, y muchos otros servicios.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Podemos localizar gran cantidad de servidores XMPP públicos, como por ejemplo &lt;a href=&quot;http://www.jaim.at/server/server_by_gateway_xmpp.html&quot;&gt;aquí&lt;/a&gt;, con detalle de los diferentes servicios que prestan, algunos registran el tipo de autenticación etc. buscando a través de Google.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Si prestamos atención a las listas, veremos que hay algunos que podemos deducir que podrían haber sido parcheados, fijándonos por el uptime que han sido reiniciados en los dos últimos días.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Utilizando las diferentes pruebas de concepto que han sido publicadas, no tardaremos en encontrar algún servidor XMPP con TLS activado que sea vulnerable a Heartbleed:&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidwt2UVxeZisnaUadYLCLlg3DyuqOCuACTXxlGIPyB4PHPKHH2_f8mU3agIuGB8WEEqxOvkHieVWZyB8NV3UbDkxljqQY5v7TCbNbg3R41beELkiyhd9XKJ51MNZxarH_ObC3IEnzqSDdM/s1600/xmpp_groar.PNG&quot; height=&quot;610&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;También se ha incorporado un módulo de Metasploit que permite comprobar la vulnerabilidad para SMTP/IMAP/POP3/XMPP dentro de su&amp;nbsp;&lt;a href=&quot;https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb&quot;&gt;repositorio oficial&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Recordad que es posible que algunos de estos servicios hayan sido atacados en los últimos meses, por lo que el atacante podría haber tenido acceso a claves privadas, credenciales, información sensible de navegación sobre VPN SSL o direcciones de memoria y contenido para evadir mecanismos de mitigación, con los riesgos que ello conllevaría.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Debido a que la explotación de esta vulnerabilidad no deja rastro en los logs, será complicado averiguar si ha existido algún tipo de compromiso de forma retroactiva.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;A partir de ahora, si queremos monitorizar los diferentes intentos de explotación de esta vulnerabilidad, podemos utilizar diferentes reglas de detección para:&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;a href=&quot;http://vrt-blog.snort.org/2014/04/heartbleed-memory-disclosure-upgrade.html&quot;&gt;Snort&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;a href=&quot;http://blog.inliniac.net/2014/04/08/detecting-openssl-heartbleed-with-suricata/&quot;&gt;Suricata&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;a href=&quot;https://github.com/bro/bro/blob/topic/bernhard/heartbeat/scripts/policy/protocols/ssl/heartbleed.bro&quot;&gt;Bro&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Si quieres comprobar si tus servicios podrían estar afectados, puedes utilizar los módulos que se han publicado hasta el momento:&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;a href=&quot;https://svn.nmap.org/nmap/scripts/ssl-heartbleed.nse&quot;&gt;Plugin NSE para nmap&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;a href=&quot;http://filippo.io/Heartbleed/&quot;&gt;Servicio de comprobación online&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;https://github.com/FiloSottile/Heartbleed&quot;&gt;código&lt;/a&gt;)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;a href=&quot;https://github.com/FiloSottile/Heartbleed&quot;&gt;Prueba de concepto original en python&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;a href=&quot;https://t.co/mSHi5txvKR&quot;&gt;Módulo de Metasploit&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Muchos proveedores de servicio se han visto afectados después de la publicación oficial del aviso y las diferentes pruebas de concepto del ataque, por lo que no sería mala idea cambiar tus credenciales de acceso, por seguridad, si en los últimos días has estado utilizando sus plataformas:&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoccxVSxP8jQn6R-vHLw2wv0_1yX-mksKULENbOOIx23hp6kAih_LiNkSPmBjfSf5eyzSmRYdh1Y9jtbtPkKlj-iHvRoTrGND8-1sJ8OG639jDmzSD_J6ZRsSXkKzq4LvFiDo4pJOqwjU/s1600/yahoo_fail.png&quot; height=&quot;394&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;

&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Como hemos visto, Hearbleed no sólo puede afectar a nuestro servidor web &#39;seguro&#39; }:)&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/6518807677763233878/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/04/mas-alla-de-heartbleed-y-https_10.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/6518807677763233878'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/6518807677763233878'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/04/mas-alla-de-heartbleed-y-https_10.html' title='Más allá de Heartbleed y HTTPS'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidwt2UVxeZisnaUadYLCLlg3DyuqOCuACTXxlGIPyB4PHPKHH2_f8mU3agIuGB8WEEqxOvkHieVWZyB8NV3UbDkxljqQY5v7TCbNbg3R41beELkiyhd9XKJ51MNZxarH_ObC3IEnzqSDdM/s72-c/xmpp_groar.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-8675811426620558057</id><published>2014-03-31T03:01:00.000-07:00</published><updated>2014-04-10T02:46:04.551-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonimato"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Herramientas"/><category scheme="http://www.blogger.com/atom/ns#" term="HighsecCON"/><category scheme="http://www.blogger.com/atom/ns#" term="IDS"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Móvil"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacidad"/><title type='text'>Participaré el 4 de Abril en la tercera edición de HighSecCON</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijgYsQ54zT0j16318gzreHtt2EU373wXedf4_FFklso8PRIbPGvWuwGhAkZb7Hv8p4s48H-Fi17jVxIYM6DDMNdzvKgAQWzz3nu3uKATcFE9-JR26RU3RSI8jJ0xtUcT8SkTA1Hzd3SYgl/s1600/highsec_conf.png&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;b&gt;HighsecCon &lt;/b&gt;es un proyecto de seguridad informática, que nace con la intención de enseñar a todo aquel que quiera aprender, las principales técnicas de hacking y seguridad.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Las jornadas tendrá lugar el próximo 4 de Abril, en el &lt;b&gt;Salón de Actos de la Escuela Politécnica Superior de la Universidad Autónoma&lt;/b&gt; de Madrid, a las 15:45 y durará hasta las 20:00, aproximadamente. Cuenta con un aforo de más de 600 plazas, así que si queréis asistir solo tenéis que registraros en &lt;a href=&quot;https://www.ticketea.com/highseccon/&quot;&gt;https://www.ticketea.com/highseccon/&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Por mi parte, participaré con una charla llamada “&lt;b&gt;From Kernel Space to WhatsApp nightmare&lt;/b&gt;“, donde hablaré un poco de las diferentes ramas de investigación utilizando el módulo nfqueue de iptables, y sus aplicaciones prácticas.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;También se ha habilitado una web para el evento (&lt;a href=&quot;http://highseccon.es/&quot;&gt;highseccon.es&lt;/a&gt;) donde tenéis toda la información. A continuación podéis ver el gran cartel de ponentes y los horarios de las diferentes charlas:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;b&gt;&lt;u&gt;16.15&lt;/u&gt; Samuel Linares&lt;/b&gt; (&lt;/span&gt;&lt;a href=&quot;https://twitter.com/InfosecManBlog&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;@InfosecManBlog&lt;/a&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;) con su charla “&lt;b&gt;¿Ciberseguridad Industrial? ¿Ein?&lt;/b&gt;“: Director y Fundador del Centro de Ciberseguridad Industrial (CCI), External Independent Evaluator en European Comission. CIIP Expert para la asistencia en la implementacion del ENISA Work Programme en ENISA (European Network and Information Security Agency).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;b&gt;&lt;u&gt;17.00&lt;/u&gt; Chema García&lt;/b&gt; (&lt;/span&gt;&lt;a href=&quot;https://twitter.com/sch3m4&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;@sch3m4&lt;/a&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;) con su charla “&lt;b&gt;Troyanización de módulos PAM&lt;/b&gt;“: Consultor de Seguridad en Ecix Group, Investigador de seguridad en Thiber y colaborador de Security By Default.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;b&gt;&lt;u&gt;18.15&lt;/u&gt; Simón Roses&lt;/b&gt; (&lt;/span&gt;&lt;a href=&quot;https://twitter.com/simonroses&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;@simonroses&lt;/a&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;) con su charla “&lt;b&gt;Algo sobre Ciberseguridad&lt;/b&gt;“: Practical Security Research en VULNEX donde es CEO y Fundador. Dicha empresa ha sido la única del mundo ajena a EEUU que ha conseguido ganar el DARPA. Anteriormente ha trabajado en Microsoft como Security Technologist y en PWC. Ponente en conferencias internacionales de seguridad y hacking como BlackHat, RSA y OWASP entre otras.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;b&gt;&lt;u&gt;19.00&lt;/u&gt;&amp;nbsp;Jaime Sánchez&lt;/b&gt;&amp;nbsp;(&lt;a href=&quot;http://twitter.com/segofensiva&quot;&gt;@segofensiva&lt;/a&gt;) con mi charla “&lt;b&gt;From Kernel Space to WhatsApp nightmare&lt;/b&gt;“&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Nos vemos el Viernes. Mientras tanto, podéis disfrutar del cartel que se han currado :)&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://hacking-etico.com/wp-content/uploads/2014/03/carteloficial.jpg&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/proxy/AVvXsEjaezpZbNLO7-awaDvLHALylW1trS1jHaDirrTeeZRlGhFcwddHONmuw3zs2sPED2uopArEIPGXCWC55DLVQcRAwgZeE97YtsHEUcd2HYS6L-zd2G5UMb5XYzwcfpebSIYkQbl5CPTN6UcwdW5zD-XDfytMaYwn3z8d-K7fkfbYGKcGdoRo=&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;


&lt;!-- Blogger automated replacement: &quot;https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F2.bp.blogspot.com%2F-ubY4vK2iX9E%2FUziRitJufEI%2FAAAAAAAAW7M%2Fl5hQakdEHK8%2Fs1600%2Fhighsec_conf.png&amp;amp;container=blogger&amp;amp;gadget=a&amp;amp;rewriteMime=image%2F*&quot; with &quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijgYsQ54zT0j16318gzreHtt2EU373wXedf4_FFklso8PRIbPGvWuwGhAkZb7Hv8p4s48H-Fi17jVxIYM6DDMNdzvKgAQWzz3nu3uKATcFE9-JR26RU3RSI8jJ0xtUcT8SkTA1Hzd3SYgl/s1600/highsec_conf.png&quot; --&gt;&lt;!-- Blogger automated replacement: &quot;https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fhacking-etico.com%2Fwp-content%2Fuploads%2F2014%2F03%2Fcarteloficial.jpg&amp;amp;container=blogger&amp;amp;gadget=a&amp;amp;rewriteMime=image%2F*&quot; with &quot;https://blogger.googleusercontent.com/img/proxy/AVvXsEjaezpZbNLO7-awaDvLHALylW1trS1jHaDirrTeeZRlGhFcwddHONmuw3zs2sPED2uopArEIPGXCWC55DLVQcRAwgZeE97YtsHEUcd2HYS6L-zd2G5UMb5XYzwcfpebSIYkQbl5CPTN6UcwdW5zD-XDfytMaYwn3z8d-K7fkfbYGKcGdoRo=&quot; --&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/8675811426620558057/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/03/participare-el-4-de-abril-en-la-tercera-edicion-de-highseccon.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/8675811426620558057'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/8675811426620558057'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/03/participare-el-4-de-abril-en-la-tercera-edicion-de-highseccon.html' title='Participaré el 4 de Abril en la tercera edición de HighSecCON'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijgYsQ54zT0j16318gzreHtt2EU373wXedf4_FFklso8PRIbPGvWuwGhAkZb7Hv8p4s48H-Fi17jVxIYM6DDMNdzvKgAQWzz3nu3uKATcFE9-JR26RU3RSI8jJ0xtUcT8SkTA1Hzd3SYgl/s72-c/highsec_conf.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-9056479512733815246</id><published>2014-03-17T02:08:00.000-07:00</published><updated>2014-03-17T02:08:49.672-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Rooted Warfare"/><category scheme="http://www.blogger.com/atom/ns#" term="Rootedcon"/><title type='text'>Gracias por hacer Rooted Warfare posible</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwPFrBVHI3D22Uz9Wm4hkh18RLnMpCIi1QF2_aEs4GWxxw0ZagRlVsrAQeFsdNIa6MmPaI0TnrtPQgUbZCOtEwYKMrGtYDQQh6Pc6tjI5wuLwTJh9e-ZYt4Eg3WZ4n4efpsh6xBHnW2n2L/s1600/IMG_4776.JPG&quot; height=&quot;640&quot; width=&quot;604&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Ya ha pasado una semana desde que finalizara la V edición de RootedCON, y como todos sabéis, había estado preparando desde hace tiempo un evento dentro del congreso, llamado &lt;a href=&quot;http://www.rootedwarfare.com/&quot;&gt;Rooted Warfare&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Me gustaría dedicar este post a todos los que lo habéis hecho de esta primera edición un éxito.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEAnivVh4B_HfcYOBJpIE4ZcgMf9kDZV9gQK0X6bpWKje55gPXd_qz-sTeJXi7luV0Torm1AnU7TbB85moDGW_qGpDvTFyMfk1VR4bvjr7dJ2l1JLeRMVnCKVvIzSiyovOg-ep6R5ZufYH/s1600/toolswatch.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEAnivVh4B_HfcYOBJpIE4ZcgMf9kDZV9gQK0X6bpWKje55gPXd_qz-sTeJXi7luV0Torm1AnU7TbB85moDGW_qGpDvTFyMfk1VR4bvjr7dJ2l1JLeRMVnCKVvIzSiyovOg-ep6R5ZufYH/s1600/toolswatch.png&quot; height=&quot;130&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;En primer lugar, al equipo de &lt;a href=&quot;http://www.toolswatch.org/&quot;&gt;Toolswatch&lt;/a&gt;. Para los que no les conocéis,&amp;nbsp;ToolsWatch es un servicio interactivo y gratuito, diseñado para ayudar a auditores, pentesters y expertos en seguridad a mantener su caja de herramientas de hacking ético actualizada hasta a la fecha. Son los responsables desde hace años de organizar el celebrar el &lt;b&gt;BlackHat Arsenal&lt;/b&gt;, y en gran parte responsables de la organización y calidad de las herramientas con las que hemos contado este año. Muchas gracias a &lt;a href=&quot;https://twitter.com/maxisoler&quot;&gt;Maxi&lt;/a&gt;&amp;nbsp;y &lt;a href=&quot;https://twitter.com/ToolsWatch&quot;&gt;Nabil&lt;/a&gt;, sin vosotros no hubiera sido posible :)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;También hay que mencionar el nivel de herramientas y gente con la que hemos podido contar, tanto nacional como internacional. Podéis obtener más información y ver el listado de herramientas que se mostraron en la &lt;a href=&quot;http://www.rootedwarfare.com/agenda/&quot;&gt;web oficial&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;No perdáis de vista la web de &lt;a href=&quot;http://www.rootedwarfare.com/&quot;&gt;Rooted Warfare&lt;/a&gt;, porque poco a poco iremos publicando guías informativas, detallando el uso de cada una de las herramientas que se pudieron ver. Además, haremos un reportaje gráfico de las tres sesiones y publicaremos algunos videos en los que entrevistamos a cada uno de los ponentes.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Muchísimas gracias al equipo de &lt;a href=&quot;http://www.eset.es/&quot;&gt;ESET&lt;/a&gt;, por confiar en la iniciativa y patrocinar el evento, y al equipo de &lt;a href=&quot;http://www.rootedcon.es/&quot;&gt;RootedCON&lt;/a&gt;, por confiar en una apuesta como ésta y por hacerme sentir como en casa. Felicidades por esos cinco años dando guerra y apoyando a la comunidad!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Todo ellos son los principales culpables de que hayamos disfrutado momentos como este:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFnceA7Sc5S5y99NOyHqvTXZNslHepLQhqleXQvVYozmz6KSABEiWeO72mohQQ8wLeHK3T9BGrwjzXSkCcQug7OaFOK-NPMzbDxNGDzY45VqW_wLOyUI3yyRyirIdemvG8eUbk_iYSLNN-/s1600/IMG_4773.JPG&quot; height=&quot;480&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Nos vemos en la siguiente edición! :)&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/9056479512733815246/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/03/gracias-por-hacer-rooted-warfare-posible.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/9056479512733815246'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/9056479512733815246'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/03/gracias-por-hacer-rooted-warfare-posible.html' title='Gracias por hacer Rooted Warfare posible'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwPFrBVHI3D22Uz9Wm4hkh18RLnMpCIi1QF2_aEs4GWxxw0ZagRlVsrAQeFsdNIa6MmPaI0TnrtPQgUbZCOtEwYKMrGtYDQQh6Pc6tjI5wuLwTJh9e-ZYt4Eg3WZ4n4efpsh6xBHnW2n2L/s72-c/IMG_4776.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-7379822131873645698</id><published>2014-03-10T02:28:00.000-07:00</published><updated>2014-03-10T02:32:13.221-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="Espionaje"/><category scheme="http://www.blogger.com/atom/ns#" term="FunXMPP"/><category scheme="http://www.blogger.com/atom/ns#" term="Privacidad"/><category scheme="http://www.blogger.com/atom/ns#" term="Rooted2014"/><category scheme="http://www.blogger.com/atom/ns#" term="Rootedcon"/><category scheme="http://www.blogger.com/atom/ns#" term="Snapchat"/><category scheme="http://www.blogger.com/atom/ns#" term="Viber"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><title type='text'>Slides de nuestra charla &quot;Whatsapp: mentiras y cintas de video&quot; en RootedCON 2014</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz_5q6EdyFzQzNtD0NG3pYZPU3ygAAfcDiz4tEHHm5jtjdy87vv_ZKemni3OJ1e7Fn9mE-0gAFLVUGPMXdo8OyWVyWZUXZJ8fJ08n9YPN7vYKCZnzrGAAkoAJcVok283qzNUV8wU5QFJTP/s1600/rootedcon2014_whatsapp.png&quot; height=&quot;408&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Ya ha finalizado la edición de &lt;a href=&quot;http://www.rootedcon.es/&quot;&gt;RootedCON &lt;/a&gt;2014, el congreso más importante en España sobre seguridad informática.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Tanto &lt;a href=&quot;https://twitter.com/psaneme&quot;&gt;Pablo San Emeterio&lt;/a&gt; como &lt;a href=&quot;https://twitter.com/segofensiva&quot;&gt;yo&lt;/a&gt; hemos tenido la suerte de poder acudir a esta imprescindible cita para compartir detalles sobre nuesta investigación en los sistemas de mensajería instantánea para telefónica móvil, una charla titulada &lt;a href=&quot;http://www.rootedcon.es/index.php/ponencias/&quot;&gt;WhatsApp: mentiras y cintas de vídeo&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Os dejamos las slides de la charla con los vídeos de las diferentes pruebas de concepto que preparamos para esta ocasión:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;486&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://www.slideshare.net/slideshow/embed_code/32098564&quot; style=&quot;border-width: 1px 1px 0; border: 1px solid #CCC; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;597&quot;&gt; &lt;/iframe&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;En cuanto nos recuperemos de la semana que hemos vivido, intentaremos hacer un post más completo, explicando con detalle cada uno de los puntos y las demos que mostramos :)&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/7379822131873645698/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/03/slides-de-nuestra-charla-whatsapp-mentiras-y-cintas-de-video-en-rootedcon-2014.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/7379822131873645698'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/7379822131873645698'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/03/slides-de-nuestra-charla-whatsapp-mentiras-y-cintas-de-video-en-rootedcon-2014.html' title='Slides de nuestra charla &quot;Whatsapp: mentiras y cintas de video&quot; en RootedCON 2014'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjz_5q6EdyFzQzNtD0NG3pYZPU3ygAAfcDiz4tEHHm5jtjdy87vv_ZKemni3OJ1e7Fn9mE-0gAFLVUGPMXdo8OyWVyWZUXZJ8fJ08n9YPN7vYKCZnzrGAAkoAJcVok283qzNUV8wU5QFJTP/s72-c/rootedcon2014_whatsapp.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-4344324884831180003</id><published>2014-03-04T06:01:00.002-08:00</published><updated>2014-03-04T06:01:49.004-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Rooted Warfare"/><category scheme="http://www.blogger.com/atom/ns#" term="Rootedcon"/><title type='text'>Agenda y horarios definitivos de Rooted Warfare</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;http://212.71.237.171/wp-content/uploads/2014/01/rooted_logo.png&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Ya está disponible la agenda con los horarios definitivos para las tres sesiones de &lt;a href=&quot;http://www.rootedwarfare.com/&quot;&gt;Rooted Warfare&lt;/a&gt; que se llevarán a cabo este año durante el congreso &lt;a href=&quot;http://www.rootedcon.es/&quot;&gt;RootedCON&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;Si este año eres de los que no te vas a perder el congreso, no lo dudes un segundo y pásate a ver las herramientas que se presentan. Yo desde luego no lo haré, así que si alguno queréis que nos conozcamos en persona, allí me encontraréis :)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Aprovecho también para agradecer a nuestro patrocinador oficial &lt;a href=&quot;http://eset.es/&quot;&gt;ESET&lt;/a&gt; por todo el apoyo prestado para esta primera edición. Gracias a gente como ellos, este evento es posible&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h3 style=&quot;color: #333333; line-height: 21px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Viernes 7 de Marzo, 14:00 - 15:00&lt;/span&gt;&lt;/h3&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt; DRADIS FRAMEWORK&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Dradis es un framework de código abierto trabajar de manera eficiente mediante la recopilación de información de diferentes herramientas, presentándola en una gran variedad de formatos.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Actualmente, se admiten Burp , Nessus, NeXpose, Nikto, Nmap, OpenVAS, OSVDB, Retina, SureCheck, HQ VulnDB, w3af, WXF y Ataque Zed Proxy pero con lo que aprenderás en este taller, podrás conectar Dradis a cualquier otra herramienta y presentar la información de la forma que necesites.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;FAVII&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Favii es una plataforma multi-usuarios para la adquisición,&amp;nbsp;representación y gestión del conocimiento siguiendo el principio&amp;nbsp;KISS.A la gestión del conocimiento con tecnologías de Web Semántica&amp;nbsp;, Favii integra&amp;nbsp;políticas de seguridad obligatorias y basada en roles (RBAC/MAC)&amp;nbsp;para el acceso y manipulación de dicho conocimiento, así como un&amp;nbsp;potente motor de búsquedas.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Tanto las políticas de seguridad, como las consultas para las&amp;nbsp;búsquedas son tratadas como cualquier otro conocimiento,&amp;nbsp;pudiendo ser manipuladas por el usuario.&amp;nbsp;En paralelo, se han desarrollado varias ontologías&amp;nbsp;para la adquisición de conocimiento en el campo de la seguridad&amp;nbsp;informática: software, hardware, direcciones IP, puertos,&amp;nbsp;administradores de las máquinas,... todo lo cual es gestionado&amp;nbsp;por Favii.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;FRUITWIFI&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;FruityWifi es una herramienta de código abierto para auditoria de redes wireless. Permite desplegar rápida y fácilmente ataques avanzados utilizando la interfaz web o enviándole mensajes. Inicialmente la aplicación fue creada para utilizarse con una Raspberry-Pi, pero puede ser instalada en cualquier sistema basado en Debian. FruityWifi se compone de modulos para darle más flexibilidad.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Estos modulos pueden ser instalados para agregar nuevas funcionalidades.Algunos de los modulos disponibles son URLsnarf, DNSspoof, Kismet, mdk3, ngrep, nmap, Squid3 y SSLstrip (con funcionalidades para inyectar código), Captive Portal, y más. La muestra se focalizará en como utilizar la FruityWifi para auditar redes wireless, desplegar ataques avanzados, como utilizar y crear modulos, como combinarlos entre sí y con otros dispositivos. Se mostrará como utilizar la herramienta en diferentes escenarios y situaciones, como controlarla remotamente a través del panel web o&amp;nbsp;enviando mensajes por ejemplo, utilizando Twitter. Además, se mostrara en exclusiva el lanzamiento del nuevo WSDL + el cliente con panel LCD y Keypad para RaspberryPi.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;SINFONIER&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&quot;Sinfonier: Sinfonier: Storm Builder for Security Intelligence&quot; es un servicio web creado por Telefónica Digital que simplifica la integración de datos open source paraa deducir metadatos de inteligencia.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;En el mundo actual estamos consumiendo una variedad cada vez mayor de los flujos de datos para su procesamiento y análisis. La integración y el uso de nuevos, o modificados flujos de datos, es un proceso que consume tiempo y que requiere una herramienta diferente en cada etapa de captura de datos, procesamiento, análisis, y el almacenamiento. Se necesita una solución que simplifique y automatice la integración de datos en aplicaciones, y permita a los desarrolladores compartir en la comunidad los algoritmos de integración .&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Sinfonier de Telefónica Digital proporciona una nube humana de analistas, con un entorno seguro y abierto, para construir de forma gráfica topologías Apache Storm, ejecutarlas y compartirlas por un período de tiempo definido.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;color: #333333; line-height: 21px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Viernes 7 de Marzo, 20:00 - 21:00&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;GOLISMERO&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;GoLismero es un framework y herramienta de seguridad open source destinada a realizar auditorias de seguridad. &amp;nbsp;Su principal característica es la capacidad de llamar a herramientas externas (como nmap, OpenVAS, sqlmap, XSSer, Wfuzz, dnsrecon, Shodan, Punkspider, Theharvester, Spiderfoot, sslscan...) importar los resultados, normalizarlos, unificarlos, mezclarlos, detectar vulnerablidades repetidas (encontradas por herramientas diferentes) y, lo más importante, reatroalimentarse con esa información.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Además, también dispone de numerosas pruebas y tests propios.GoLismero está pensado, no solamente pare el pen-tester, también está pensado para que cumpla los ciclos y necesidades de una auditoría a un cliente real, ya&amp;nbsp;que tiene scopes bien definidos y configurables, se puede definir el nivel de intrusión de las pruebas,&amp;nbsp;todo el proceso de la auditoría y pruebas realizadas queda logeado en base de datos, con marcas temporales, y&amp;nbsp;cualquier auditoría hecha con golismero es reproducible.&amp;nbsp;Soporta numerosos formatos en los que mostrar los resultados. Actualmente en el que más se ha trabajado es el HTML portable (sin dependencias de ningún tipo, ni imágenes. Toda la información está empotrada en un único fichero HTML). En un futuro se incorporarán informes en word y pdf.&amp;nbsp;Extender golismero con plugins propios extremandamente sencillo.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;HTTPAUTHCRACK&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;HttpAuthCrack es una herramienta desarrollada en Python para probar credenciales en sitios y dispositivos que utilizan Autenticación HTTP de tipo Basic.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Para indicar los sitios y dispositivos a probar, se le puede pasar una lista de direcciones IP en un fichero, o puede utilizarse el resultado de una búsqueda en Shodan pasando un &quot;shodan dork&quot; como argumento.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;PARAMETERFUZZ&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;ParameterFuzz es una herramienta de auditoria web, destinada a comprobar mediante un diccionario, la existencia de parámetros en aquellas páginas, donde el código HTML de las mismas no los contiene.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Tras la recolecta de parámetros, se trata de explotar vulnerabilidades de varios tipos con el añadido de herramientas que ParameterFuzz ofrece al auditor, para identificar con mayor facilidad fallos de seguridad.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;ROBOTS RIDER&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Robots Rider es una aplicación de línea de comandos que unifica múltiples herramientas externas con el objetivo de identificar una superficie interesante con la que comenzar un pentest sobre un dominio o un listado de URLs públicas.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Para ello, utiliza &#39;theHarvester&#39; para obtener un listado completo de dominios relacionados con el dominio que tenemos como objetivo. En caso de no especificarle un dominio, sino un listado de URLs concretas explorará exclusivamente estas.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;color: #333333; line-height: 21px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Sábado 8 de Marzo, 14:00 - 15:00&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;PEEPDF&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;peepdf es una herramienta escrita en Python para explorar los archivos PDF, con el fin de averiguar si el archivo puede ser dañino o no. Su objetivo es proporcionar todos los componentes necesarios que un investigador de seguridad podría necesitar en un análisis de PDF, sin usar 3 o 4 herramientas para hacer todas las tareas.Con peepdf es posible ver todos los objetos en el documento, así como los elementos sospechosos.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Soporta todos los filtros y las codificaciones más utilizadas, se puede analizar diferentes versiones de un archivo, arrays de objetos y archivos cifrados. Con la instalación de PyV8 y Pylibemu proporciona Javascript y &amp;nbsp;análisis de shellcodes también. Aparte de esto, es capaz de crear nuevos archivos PDF y para modificar / ofuscar los existentes.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;K0SAP&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;K0sap es un paquete de instalación para sistemas Mac OS X capaz de compilar y dejar instalados todos aquellos programas que son necesarios para las auditorias de seguridad y hacking ético. Organizandolos en categorías, sin necesidad de compilar ningún software y haciendo muchas de las herramientas compatibles con Mac OS X. Ahorrándonos tiempo en instalación y compilación.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;De esta manera podemos tener instalado de una sola vez un gran número de herramientas al estilo Kali Linux.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;OSUETA&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;OSUETA es el acrónimo de OpenSsh User Enumeration Timing Attack, es un pequeño script escrito en Python para explotar un bug, que hasta donde yo se aún no corregido, presente en las versiones 5.* y 6.* de OpenSSH. En estas versiones durante el proceso de autenticación, es posible obtener una lista de los usuarios presentes en el sistema discriminando por el tiempo que tarda el sistema en evaluar una contraseña arbitrariamente larga.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Si el usuario esta presente el tiempo que tarda el servidor en responder es mayor, en un orden de magnitud, que con respecto a un usuario no presente. Por ejemplo, al permitir conocer los usuarios presentes en un sistema, este herramienta puede ser de utilidad dentro de tests de penetración para acortar los tiempos en los ataque por fuerza bruta.&amp;nbsp;Por otra parte el script también tiene la capacidad, debido a la carga a la que se le somete al servidor y bajo ciertas circunstancias, de establecer una condición de Denegación de Servicio en servicio ssh.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;strong&gt;ZAP&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;ZAP Proxy es una herramienta gratuita y de código abierto en continua mejora. Un aspecto muy interesante de ZAP es una API que permite manipular la herramienta con nuestros propios scripts.&lt;/span&gt;&lt;/div&gt;
&lt;div data-mce-style=&quot;text-align: justify;&quot; style=&quot;color: #333333; font-size: 14px; line-height: 21px; margin-bottom: 1.3em; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Además de mostrar las capacidades más novedosas de ZAP Proxy, se liberará la herramienta desarrollada, denominado getzapdata.py, que haciendo uso de la API de ZAP extrae todos los puntos de entrada (parámetros GET, POST, Cookies y Headers) y los pone en un CSV para su análisis posterior.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/4344324884831180003/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/03/agenda-y-horarios-definitivos-de-rooted-warfare.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/4344324884831180003'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/4344324884831180003'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/03/agenda-y-horarios-definitivos-de-rooted-warfare.html' title='Agenda y horarios definitivos de Rooted Warfare'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-5850464719535292137</id><published>2014-03-03T02:23:00.000-08:00</published><updated>2014-03-04T05:51:11.854-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Rooted Warfare"/><category scheme="http://www.blogger.com/atom/ns#" term="Rootedcon"/><category scheme="http://www.blogger.com/atom/ns#" term="RootedPanel"/><title type='text'>Entrevistados para Radio3W. Román Ramírez y yo hablamos de RootedCON 2014, RootedWarfare y mucho más...</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx53JSq5bRBRuGZCz5tEjrpKimgyG7KJPSkDsxm3uIxQCOWvayYP7e76EXk2djUpAnppxj42O9osylF02sM7XofLqIdr_CB1PYSmM67ROm_zAlVPqzfCoYIoMvvZKE_hBzXmEsZ_19YwQQ/s1600/radio3w_rootedcon.png&quot; height=&quot;314&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;A falta de una semana para la celebración de la &lt;a href=&quot;http://www.rootedcon.es/&quot;&gt;RootedCON&lt;/a&gt; 2014, Román Ramírez presidente de la Rooted y yo hemos estado de visita por Radio3W para hablar de algunas de las novedades para el congreso de este año.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Repasamos distintos aspectos del congreso, ponentes, en qué consiste, Rooted Panel, etc. y como no, hablaremos mucho sobre la nueva iniciativa&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.rootedwarfare.com/&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Rooted Warfare&lt;/a&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Podéis descargar o escuchar online la entrevista pulsando el icono&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://radio3w.com/podcast/VENTANASALARED/VENTANASALARED_20140228.mp3&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://ventanasalared.radio3w.com/wp-content/plugins/powerpress//images/altavoz.jpg&quot; height=&quot;16&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Toda la información de la Rooted CON la podéis encontrar en: &lt;a href=&quot;http://www.rootedcon.es/&quot;&gt;Web de RootedCON&lt;/a&gt;, Twitter (&lt;a href=&quot;https://twitter.com/rootedcon&quot;&gt;@rootedcon&lt;/a&gt;) o en &lt;a href=&quot;https://www.facebook.com/groups/rootedcon/&quot;&gt;Facebook&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/5850464719535292137/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/03/entrevista-para-radio3w-con-roman-ramirez-hablando-de-rootedcon-2014.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/5850464719535292137'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/5850464719535292137'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/03/entrevista-para-radio3w-con-roman-ramirez-hablando-de-rootedcon-2014.html' title='Entrevistados para Radio3W. Román Ramírez y yo hablamos de RootedCON 2014, RootedWarfare y mucho más...'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx53JSq5bRBRuGZCz5tEjrpKimgyG7KJPSkDsxm3uIxQCOWvayYP7e76EXk2djUpAnppxj42O9osylF02sM7XofLqIdr_CB1PYSmM67ROm_zAlVPqzfCoYIoMvvZKE_hBzXmEsZ_19YwQQ/s72-c/radio3w_rootedcon.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8212444198868605578.post-7077290610203545340</id><published>2014-02-26T01:46:00.000-08:00</published><updated>2014-05-28T14:41:10.819-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Conferencias"/><category scheme="http://www.blogger.com/atom/ns#" term="General"/><category scheme="http://www.blogger.com/atom/ns#" term="Rooted Warfare"/><category scheme="http://www.blogger.com/atom/ns#" term="Rootedcon"/><category scheme="http://www.blogger.com/atom/ns#" term="RootedPanel"/><category scheme="http://www.blogger.com/atom/ns#" term="seguridad bancaria"/><category scheme="http://www.blogger.com/atom/ns#" term="Snapchat"/><title type='text'>En el punto de mira: Snapchat, &#39;in&#39;seguridad bancaria, WhatsApp, RootedCON, RootedPanel y RootedWarfare</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;http://www.richmondsolutions.co.uk/_header/security%20header.jpg&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Hacía ya tiempo que no volvía a escribir en el blog. Tenía preparados unos post sobre &#39;in&#39;seguridad bancaria para publicar y compartirlos con todos vosotros, pero parece que finalmente no podrán ver la luz por el momento, hasta que estén solucionados. Cosas del directo, ya sabéis...&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&amp;nbsp;Pero prometo que en breve volveré a la carga con más cosas interesantes relacionadas con el sector banca y la seguridad!&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Han ocurrido muchas cosas estas últimas semanas. He estado ocupado trabajando con el equipo de seguridad de &lt;a href=&quot;http://www.snapchat.com/&quot;&gt;Snapchat&lt;/a&gt; para solucionar el problema que provocaba que el móvil acabara prácticamente tostado. Os hablaré un poco más de todo esto en cuanto tenga algo más de tiempo libre, y de como ha llegado un nuevo actor a este tema, como la gente de Product Security de &lt;a href=&quot;http://www.apple.com/&quot;&gt;Apple&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;Pero ya quedan menos de 15 días para que de comienzo la primera edición de &lt;a href=&quot;http://www.rootedwarfare.com/&quot;&gt;Rooted Warfare&lt;/a&gt;, y se me ha hecho complicado escribir cosas nuevas en el blog, con tanto lío y tareas para la organización del evento.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Estoy especialmente contento con los resultados y las herramientas que han sido seleccionadas para el Warfare. Habrá muchas cosas interesantes, desde herramientas gratuítas en la nube, frameworks conocidos, otros por conocer, herramientas para pentesting para entornos Web, incluída alguna imprescindible de la gente de &lt;a href=&quot;http://www.owasp.org/&quot;&gt;OWASP&lt;/a&gt; etc.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Os agradezco a todos la inmensa colaboración, y espero ver muchos rostros conocidos allí.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Parece que también ha sido noticia la compra de &lt;a href=&quot;http://www.whatsapp.com/&quot;&gt;WhatsApp&lt;/a&gt; por parte del gigante &lt;a href=&quot;http://www.facebook.com/&quot;&gt;Facebook&lt;/a&gt;. Esta sorpresa, además de con una caída sin precedentes del servicio el fin de semana, ha venido acompañado de la noticia de que WhatsApp ofrecerá servicios de llamadas a través de la aplicación este mismo verano. Estoy ansioso por poder jugar con este nuevo servicio y ver qué somos capaces de hacer como nos dejen algo de margen para jugar.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Otra duda que me surge es: ¿se incluirá WhatsApp dentro del bug bounty de Facebook? Porque en ese caso voy a descorchar ya una botella para celebrarlo :P&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Si no te quieres perder nada de la actualidad de WhatsApp y su seguridad, el Sábado 8 de Marzo  tienes una cita con nuestra charla &quot;&lt;b&gt;WhatsApp: mentiras y cintas de vídeo&lt;/b&gt;&quot;, que daré en compañía de mi amigo y compañero &lt;a href=&quot;https://twitter.com/psaneme&quot;&gt;Pablo San Emeterio&lt;/a&gt; en &lt;a href=&quot;http://www.rootedcon.es/&quot;&gt;RootedCON&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Finalmente, también estaré presente en el &lt;a href=&quot;http://www.rootedcon.es/index.php/informacion-sobre-el-rootedpanel-del-jueves-6-de-marzo/&quot;&gt;RootedPanel&lt;/a&gt; del Jueves 6 de Marzo &quot;&lt;b&gt;Colaboración público-privada en la ciberdefensa nacional: el papel de la comunidad hacker&lt;/b&gt;&quot;. Los moderadores serán &lt;b&gt;Luis Fernández&lt;/b&gt; y &lt;b&gt;José de la Peña&lt;/b&gt; y se contará con la participación de los ilustrísimos:&lt;/div&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Miguel Ángel Abad&lt;/b&gt;: Jefe del Servicio de Ciberseguridad del Centro Nacional para la Protección de Infraestructuras Críticas, CNPIC. Secretaría de Estado de Seguridad. Ministerio del Interior.&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Jorge Dávila&lt;/b&gt;: Director del Laboratorio de Criptografía de la UPM y Director de I+D de EnCifra.&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Javier Candau&lt;/b&gt;: Jefe del Área de Ciberseguridad del Centro Criptológico Nacional, CCN. CNI.&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Néstor Ganuza&lt;/b&gt;: Teniente Coronel. Mando Conjunto de Ciberdefensa. MCCD. Ministerio de Defensa.&amp;nbsp;&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;Román Ramírez&lt;/b&gt;: cofundador de RootedCON.&amp;nbsp;&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Os animo a atender a esta mesa redonda/RootedPANEL puesto que se tratarán temas muy importantes para el sector.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://www.seguridadofensiva.com/feeds/7077290610203545340/comments/default' title='Enviar comentarios'/><link rel='replies' type='text/html' href='http://www.seguridadofensiva.com/2014/02/en-el-punto-de-mira-snapchat-inseguridad-bancaria-whatsapp-rootedcon-rootedpanel-y-rooted-warfare.html#comment-form' title='0 comentarios'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/7077290610203545340'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8212444198868605578/posts/default/7077290610203545340'/><link rel='alternate' type='text/html' href='http://www.seguridadofensiva.com/2014/02/en-el-punto-de-mira-snapchat-inseguridad-bancaria-whatsapp-rootedcon-rootedpanel-y-rooted-warfare.html' title='En el punto de mira: Snapchat, &#39;in&#39;seguridad bancaria, WhatsApp, RootedCON, RootedPanel y RootedWarfare'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>