
{"id":2939,"date":"2016-03-22T16:25:00","date_gmt":"2016-03-22T19:25:00","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=2939"},"modified":"2016-03-22T16:25:00","modified_gmt":"2016-03-22T19:25:00","slug":"que-puede-obtener-un-intruso-cibernetico-de-su-empresa","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/","title":{"rendered":"\u00bfQue puede obtener un intruso cibern\u00e9tico de su empresa?"},"content":{"rendered":"<p align=\"justify\">A modo de ejemplo, mostramos como por un problema de seguridad, <b>un intruso <\/b><b>puede<\/b><b> obtener <\/b><b>credenciales de <\/b><b>acceso<\/b><b> de usuarios de <\/b><b>un sistema<\/b>.<\/p>\n<p align=\"justify\">Como vemos, tenemos un sistema ecommerce que vende productos online, que permite realizar compras de productos.<\/p>\n<p align=\"justify\">Realizamos una b\u00fasqueda de un producto y el sistema muestra el mismo. Luego al realizar una nueva b\u00fasqueda pero realizando una prueba de inyecci\u00f3n, vemos que el sistema responde con un error. Esto nos da una idea, que el sistema podr\u00eda tener un problema de seguridad. Al encontrar el problema, utilizaremos una herramienta que nos agilice en las pruebas, y de esta manera, extraer la informaci\u00f3n.<b> <\/b><\/p>\n<p align=\"justify\">Al finalizar el ataque<b>,<\/b> <b>obtuvimos las credenciales de usuarios, pudiendo ingresar en el sistema, divulgando la <\/b><b>informaci\u00f3n<\/b><b> <\/b><b>p\u00fablicamente,<\/b><b> vendiendo la <\/b><b>informaci\u00f3n<\/b><b> al mercado negro o a la competencia de la empresa.<\/b><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Este es el momento de empezar a proteger su negocio<\/strong><\/span>. Obtenga<span style=\"text-decoration: underline;\"><strong> sin costo su cotizaci\u00f3n personalizada<\/strong> <\/span>con nuestros expertos, <span style=\"text-decoration: underline;\"><strong>ahora mismo<\/strong>&#8230;<\/span><\/p>\n<p style=\"text-align: left;\">[tw_button icon=&#8221;&#8221; link=&#8221;https:\/\/www.talsoft-security.com\/site\/wpgforms\/presupuesto\/&#8221; size=&#8221;medium&#8221; rounded=&#8221;true&#8221; style=&#8221;flat&#8221; hover=&#8221;default&#8221; color=&#8221;#f01d1d&#8221; target=&#8221;_blank&#8221;]Obtener una cotizaci\u00f3n[\/tw_button]<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A modo de ejemplo, mostramos como por un problema de seguridad, un intruso puede obtener credenciales de acceso de usuarios de un sistema. Como vemos, tenemos un sistema ecommerce que vende productos online, que permite realizar compras de productos. Realizamos una b\u00fasqueda de un producto y el sistema muestra el mismo. Luego al realizar una [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"video","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-2939","post","type-post","status-publish","format-video","hentry","category-profesional","post_format-post-format-video"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue puede obtener un intruso cibern\u00e9tico de su empresa?<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"\u00bfQue puede obtener un intruso cibern\u00e9tico de su empresa?\",\"datePublished\":\"2016-03-22T19:25:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/\"},\"wordCount\":208,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue puede obtener un intruso cibern\u00e9tico de su empresa?\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2016-03-22T19:25:00+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue puede obtener un intruso cibern\u00e9tico de su empresa?","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"\u00bfQue puede obtener un intruso cibern\u00e9tico de su empresa?","datePublished":"2016-03-22T19:25:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/"},"wordCount":208,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/","url":"https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfQue puede obtener un intruso cibern\u00e9tico de su empresa?","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2016-03-22T19:25:00+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/que-puede-obtener-un-intruso-cibernetico-de-su-empresa\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=2939"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2939\/revisions"}],"predecessor-version":[{"id":2940,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2939\/revisions\/2940"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=2939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=2939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=2939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}