
{"id":330,"date":"2008-03-25T10:46:37","date_gmt":"2008-03-25T13:46:37","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=330"},"modified":"2008-03-25T10:46:37","modified_gmt":"2008-03-25T13:46:37","slug":"russix-distribucion-linux-live-para-auditoria-de-redes-wireless","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/","title":{"rendered":"Russix: Distribuci\u00c3\u00b3n Linux Live para auditor\u00c3\u00ada de redes wireless"},"content":{"rendered":"<p><a href=\"http:\/\/www.russix.com\/\">Russix<\/a> es una distribuci\u00c3\u00b3n Linux <em>live<\/em> basada en Slax, para el an\u00c3\u00a1lisis de conectividades inal\u00c3\u00a1mbricas.<img decoding=\"async\" src=\"http:\/\/www.russix.com\/images\/med.png\" alt=\"russix\" \/><\/p>\n<p>Como otras distribuciones similares, se trata de un producto con determinados programas muy empleados cuando se realizan auditor\u00c3\u00adas wireless, como por ejemplo Wifizoo, Wepattack, Kismet, cowpatty o asleap. Como siempre, todo est\u00c3\u00a1 orientado a la ruptura de claves <a href=\"http:\/\/www.russix.com\/downloads\/WEP%20cracking%20with%20RUSSIX.pdf\">WEP<\/a>, <a href=\"http:\/\/www.russix.com\/downloads\/WPA%20cracking%20with%20RUSSIX.pdf\">WPA<\/a> y <a href=\"http:\/\/www.russix.com\/downloads\/WPA%20cracking%20with%20RUSSIX.pdf\">WPA2<\/a>. Si se dispone de dos tarjetas, es factible realizar una ruptura WEP en s\u00c3\u00b3lo 6 pasos, mediante un m\u00c3\u00a9todo que se conoce como ataque <em>Evil Tiny Twin<\/em>.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.h-labs.org\/images\/RussixTheWirelessAuditingLiveLinux_D5EA\/russix_thumb.jpg\" alt=\"russix\" \/><\/p>\n<p>Para usar Russix necesitaremos una tarjeta wireless con chipset Atheros. Esta exclusi\u00c3\u00b3n se fundamenta en que los <em>chipset<\/em> Atheros son, en opini\u00c3\u00b3n de los autores los \u00c3\u00banicos que pueden procesar inyecciones de paquetes fiables para ataques contra WEP y WPA. Abro la veda para que, quien conozca otros <em>chipsets<\/em>, hablen de su experiencia en este tipo de ataques contra redes inal\u00c3\u00a1mbricas en Linux.<\/p>\n<p>En lo que a m\u00c3\u00ad respecta, no me ha ido mal nunca ni con <em>chipsets<\/em> Ralink, ni con Zydas, aunque es probable que no posibiliten ataques <em>Evil Tiny Twin<\/em>. A modo de recomendaci\u00c3\u00b3n, para tener buen hardware wireless compatible con Linux y con chipset Atheros, me vienen a la cabeza <a href=\"http:\/\/www.ubnt.com\/products\/\">las PCMCIA de Ubiquity<\/a>, si bien no tengo ninguna tarjeta de este fabricante y baso mi opini\u00c3\u00b3n en un par de demos que vi en su d\u00c3\u00ada. Si alguien puede confirmar, adelante <img decoding=\"async\" src=\"http:\/\/www.sahw.com\/wp\/wp-includes\/images\/smilies\/icon_wink.gif\" alt=\";)\" class=\"wp-smiley\" \/><\/p>\n<p><a href=\"http:\/\/www.quands.cat\/wp\/2008\/03\/20\/russix-distribucio-linux-per-a-auditoria-de-xarxes-sense-fil\/\">Lo comenta tambi\u00c3\u00a9n Xavi<\/a><\/p>\n<p>Fuente: http:\/\/www.sahw.com\/wp\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Russix es una distribuci\u00c3\u00b3n Linux live basada en Slax, para el an\u00c3\u00a1lisis de conectividades inal\u00c3\u00a1mbricas. Como otras distribuciones similares, se trata de un producto con determinados programas muy empleados cuando se realizan auditor\u00c3\u00adas wireless, como por ejemplo Wifizoo, Wepattack, Kismet, cowpatty o asleap. Como siempre, todo est\u00c3\u00a1 orientado a la ruptura de claves WEP, WPA [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-330","post","type-post","status-publish","format-standard","hentry","category-articulos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Russix: Distribuci\u00c3\u00b3n Linux Live para auditor\u00c3\u00ada de redes wireless<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Russix: Distribuci\u00c3\u00b3n Linux Live para auditor\u00c3\u00ada de redes wireless\",\"datePublished\":\"2008-03-25T13:46:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/\"},\"wordCount\":262,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.russix.com\/images\/med.png\",\"articleSection\":[\"Art\u00c3\u00adculos\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Russix: Distribuci\u00c3\u00b3n Linux Live para auditor\u00c3\u00ada de redes wireless\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.russix.com\/images\/med.png\",\"datePublished\":\"2008-03-25T13:46:37+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/#primaryimage\",\"url\":\"http:\/\/www.russix.com\/images\/med.png\",\"contentUrl\":\"http:\/\/www.russix.com\/images\/med.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Russix: Distribuci\u00c3\u00b3n Linux Live para auditor\u00c3\u00ada de redes wireless","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Russix: Distribuci\u00c3\u00b3n Linux Live para auditor\u00c3\u00ada de redes wireless","datePublished":"2008-03-25T13:46:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/"},"wordCount":262,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/#primaryimage"},"thumbnailUrl":"http:\/\/www.russix.com\/images\/med.png","articleSection":["Art\u00c3\u00adculos"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/","url":"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Russix: Distribuci\u00c3\u00b3n Linux Live para auditor\u00c3\u00ada de redes wireless","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/#primaryimage"},"thumbnailUrl":"http:\/\/www.russix.com\/images\/med.png","datePublished":"2008-03-25T13:46:37+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/russix-distribucion-linux-live-para-auditoria-de-redes-wireless\/#primaryimage","url":"http:\/\/www.russix.com\/images\/med.png","contentUrl":"http:\/\/www.russix.com\/images\/med.png"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}