
{"id":278,"date":"2007-11-12T22:53:39","date_gmt":"2007-11-13T01:53:39","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=278"},"modified":"2007-11-12T22:53:39","modified_gmt":"2007-11-13T01:53:39","slug":"seguridad-wifi-generar-falsos-puntos-de-acceso","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/","title":{"rendered":"Seguridad Wifi, generar falsos puntos de acceso."},"content":{"rendered":"<p>Esta t\u00c3\u00a9cnica consiste en usar una aplicaci\u00c3\u00b3n para Linux llamada FakeAP, con la que podemos generar muchos falsos puntos de<a onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\" href=\"http:\/\/bp2.blogger.com\/_hS7JC7hfz9A\/RvkY5AbzaSI\/AAAAAAAAAGI\/9GYMwBBzQ_g\/s1600-h\/fakeap.JPG\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5114146219504134434\" style=\"float: left; margin: 0pt 10px 10px 0pt; cursor: pointer\" src=\"http:\/\/bp2.blogger.com\/_hS7JC7hfz9A\/RvkY5AbzaSI\/AAAAAAAAAGI\/9GYMwBBzQ_g\/s200\/fakeap.JPG\" border=\"0\" \/><\/a> acceso. De esta forma cuando un atacante busque nuestro punto de acceso se encontrara con 100 AP de los que 99 son falsos y solo uno verdadero, para atacar el verdadero tendr\u00c3\u00a1 que probar uno por uno. Adem\u00c3\u00a1s FakeAP genera diferentes ESSID utilizando los nombres por defecto que incluyen diferentes fabricantes de AP y diferentes direcciones MAC de or\u00c3\u00adgenes coherentes con los fabricantes, tambi\u00c3\u00a9n tiene la posibilidad de establecer eses nombres de ESSID manualmente.<\/p>\n<p>Esta t\u00c3\u00a9cnica que puede clasificarse como Honeypot, no tiene sentido como defensa de AP de redes publicas, aunque puede ser usada como t\u00c3\u00a9cnica de ataque a dichas redes, haciendo muchas replicas del ESSID del punto de acceso, eso generar\u00c3\u00ada confusi\u00c3\u00b3n entre los usuarios que se quieran conectar.<\/p>\n<p>M\u00c3\u00a1s informaci\u00c3\u00b3n y descarga de FakeAP:<br \/>\n<a href=\"http:\/\/www.blackalchemy.to\/project\/fakeap\/\" target=\"_blank\"><font color=\"#99aadd\">http:\/\/www.blackalchemy.to\/project\/fakeap<\/font><\/a><\/p>\n<p>Tarros de miel:<br \/>\n<a href=\"http:\/\/vtroger.blogspot.com\/2006\/11\/tarros-de-miel.html\" target=\"_blank\"><font color=\"#99aadd\">http:\/\/vtroger.blogspot.com\/2006\/11\/tarros-de-miel.html<\/font><\/a><\/p>\n<p>Fuente: <a href=\"http:\/\/vtroger.blogspot.com\/\">http:\/\/vtroger.blogspot.com\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Esta t\u00c3\u00a9cnica consiste en usar una aplicaci\u00c3\u00b3n para Linux llamada FakeAP, con la que podemos generar muchos falsos puntos de acceso. De esta forma cuando un atacante busque nuestro punto de acceso se encontrara con 100 AP de los que 99 son falsos y solo uno verdadero, para atacar el verdadero tendr\u00c3\u00a1 que probar uno [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-278","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Seguridad Wifi, generar falsos puntos de acceso.<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Seguridad Wifi, generar falsos puntos de acceso.\",\"datePublished\":\"2007-11-13T01:53:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/\"},\"wordCount\":183,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/bp2.blogger.com\/_hS7JC7hfz9A\/RvkY5AbzaSI\/AAAAAAAAAGI\/9GYMwBBzQ_g\/s200\/fakeap.JPG\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Seguridad Wifi, generar falsos puntos de acceso.\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/bp2.blogger.com\/_hS7JC7hfz9A\/RvkY5AbzaSI\/AAAAAAAAAGI\/9GYMwBBzQ_g\/s200\/fakeap.JPG\",\"datePublished\":\"2007-11-13T01:53:39+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/#primaryimage\",\"url\":\"http:\/\/bp2.blogger.com\/_hS7JC7hfz9A\/RvkY5AbzaSI\/AAAAAAAAAGI\/9GYMwBBzQ_g\/s200\/fakeap.JPG\",\"contentUrl\":\"http:\/\/bp2.blogger.com\/_hS7JC7hfz9A\/RvkY5AbzaSI\/AAAAAAAAAGI\/9GYMwBBzQ_g\/s200\/fakeap.JPG\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Seguridad Wifi, generar falsos puntos de acceso.","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Seguridad Wifi, generar falsos puntos de acceso.","datePublished":"2007-11-13T01:53:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/"},"wordCount":183,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/#primaryimage"},"thumbnailUrl":"http:\/\/bp2.blogger.com\/_hS7JC7hfz9A\/RvkY5AbzaSI\/AAAAAAAAAGI\/9GYMwBBzQ_g\/s200\/fakeap.JPG","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/","url":"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Seguridad Wifi, generar falsos puntos de acceso.","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/#primaryimage"},"thumbnailUrl":"http:\/\/bp2.blogger.com\/_hS7JC7hfz9A\/RvkY5AbzaSI\/AAAAAAAAAGI\/9GYMwBBzQ_g\/s200\/fakeap.JPG","datePublished":"2007-11-13T01:53:39+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/seguridad-wifi-generar-falsos-puntos-de-acceso\/#primaryimage","url":"http:\/\/bp2.blogger.com\/_hS7JC7hfz9A\/RvkY5AbzaSI\/AAAAAAAAAGI\/9GYMwBBzQ_g\/s200\/fakeap.JPG","contentUrl":"http:\/\/bp2.blogger.com\/_hS7JC7hfz9A\/RvkY5AbzaSI\/AAAAAAAAAGI\/9GYMwBBzQ_g\/s200\/fakeap.JPG"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=278"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/278\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}