
{"id":18,"date":"2007-01-18T08:25:23","date_gmt":"2007-01-18T11:25:23","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=18"},"modified":"2007-01-18T08:25:23","modified_gmt":"2007-01-18T11:25:23","slug":"auditoria-de-sistemas-unix","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/","title":{"rendered":"Auditor\u00c3\u00ada de sistemas UNIX"},"content":{"rendered":"<p>Desde hace un tiempo <a href=\"http:\/\/www.sahw.com\/\"><font color=\"#de7008\">Sergio Hernando est\u00c3\u00a1 publicando en su blog<\/font><\/a> esta serie de art\u00c3\u00adculos m\u00c3\u00a1s que educativos sobre la forma pr\u00c3\u00a1ctica de realizar auditor\u00c3\u00adas sobre sistemas Unix.<\/p>\n<p>La serie es la siguiente:<\/p>\n<p><a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2006\/12\/17\/auditoria-de-sistemas-unix-parte-1-la-piedra-rosetta-unix\/\"><font color=\"#de7008\">Parte 1. La Piedra Rosetta UNIX<\/font><\/a><br \/>\n<a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2006\/12\/18\/auditoria-de-sistemas-unix-parte-2-identificacion-del-sistema\/\"><font color=\"#de7008\">Parte 2. Identificaci\u00c3\u00b3n del sistema<\/font><\/a><br \/>\n<a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2006\/12\/19\/auditoria-de-sistemas-unix-parte-3-el-nivel-de-parche\/\"><font color=\"#de7008\">Parte 3. El nivel de parche<\/font><\/a><br \/>\n<a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2006\/12\/20\/auditoria-de-sistemas-unix-parte-4-los-permisos-de-los-ficheros-del-directorio-etc\/\"><font color=\"#de7008\">Parte 4. Los permisos de los ficheros del directorio \/etc<\/font><\/a><br \/>\n<a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2006\/12\/24\/auditoria-de-sistemas-unix-parte-5-procesos-en-ejecucion\/\"><font color=\"#de7008\">Parte 5. Procesos en ejecuci\u00c3\u00b3n<\/font><\/a><br \/>\n<a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2007\/01\/04\/auditoria-de-sistemas-unix-parte-6-compiladores-en-maquinas-de-produccion\/\"><font color=\"#de7008\">Parte 6. Compiladores en m\u00c3\u00a1quinas de producci\u00c3\u00b3n<\/font><\/a><br \/>\n<a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2007\/01\/09\/auditoria-de-sistemas-unix-parte-7-autorizaciones-cron\/\"><font color=\"#de7008\">Parte 7. Autorizaciones cron<\/font><\/a><br \/>\n<a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2007\/01\/10\/auditoria-de-sistemas-unix-parte-8-variables-de-entorno\/\"><font color=\"#de7008\">Parte 8. Variables de entorno<\/font><\/a><br \/>\n<a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2007\/01\/10\/auditoria-de-sistemas-unix-parte-9-ficheros-ocultos\/\"><font color=\"#de7008\">Parte 9. Ficheros ocultos<\/font><\/a><br \/>\n<a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2007\/01\/15\/auditoria-de-sistemas-unix-parte-10-ficheros-con-sticky-bit\/\"><font color=\"#de7008\">Parte 10. Ficheros con sticky bit<\/font><\/a><br \/>\n<a href=\"http:\/\/www.sahw.com\/wp\/archivos\/2007\/01\/16\/auditoria-de-sistemas-unix-parte-11-ficheros-con-bit-setgid-y-setuid\/\"><font color=\"#de7008\">Parte 11. Ficheros con bit setgid y setuid<\/font><\/a><\/p>\n<p>No dudo que continuar\u00c3\u00a1 con la misma calidad.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Desde hace un tiempo Sergio Hernando est\u00c3\u00a1 publicando en su blog esta serie de art\u00c3\u00adculos m\u00c3\u00a1s que educativos sobre la forma pr\u00c3\u00a1ctica de realizar auditor\u00c3\u00adas sobre sistemas Unix. La serie es la siguiente: Parte 1. La Piedra Rosetta UNIX Parte 2. Identificaci\u00c3\u00b3n del sistema Parte 3. El nivel de parche Parte 4. Los permisos de [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-18","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Auditor\u00c3\u00ada de sistemas UNIX<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Auditor\u00c3\u00ada de sistemas UNIX\",\"datePublished\":\"2007-01-18T11:25:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/\"},\"wordCount\":109,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Auditor\u00c3\u00ada de sistemas UNIX\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2007-01-18T11:25:23+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Auditor\u00c3\u00ada de sistemas UNIX","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Auditor\u00c3\u00ada de sistemas UNIX","datePublished":"2007-01-18T11:25:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/"},"wordCount":109,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/","url":"https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Auditor\u00c3\u00ada de sistemas UNIX","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2007-01-18T11:25:23+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/auditoria-de-sistemas-unix\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=18"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/18\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=18"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=18"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}