
{"id":357,"date":"2008-07-17T15:15:28","date_gmt":"2008-07-17T18:15:28","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=357"},"modified":"2008-07-17T15:15:28","modified_gmt":"2008-07-17T18:15:28","slug":"botnets-y-sus-implicancias","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/","title":{"rendered":"BotNets y sus implicancias"},"content":{"rendered":"<p>En este post quiero hacer alusi\u00c3\u00b3n a la facilidad de hoy en d\u00c3\u00ada de numerosas herramientas para crear BotNet.<br \/>\nPero lo que veo ultimamente investigando estos temas, es que existen en la red numerosos tutoriales con simples pasos para crear nuestra propia Botnet, esto permite que personas sin experiencias y sin objectivos claros de lo que hacen estas herramientas, creen botnet para probarlas y poner en peligro a la v\u00c3\u00adctima que eligieron por diversi\u00c3\u00b3n o desconocimiento.<br \/>\nAgregando con esto que la instalaci\u00c3\u00b3n de Software para compilar un Bot y su configuraci\u00c3\u00b3n se puede realizar en 40 min.<br \/>\nLos objetivos que podemos encontrar en la utilizaci\u00c3\u00b3n de Botnet est\u00c3\u00a1n:<\/p>\n<p>&#8211; Envio de Correo Spam.<br \/>\n&#8211; Robo de Contrase\u00c3\u00b1as e Identidad.<br \/>\n&#8211; DoS a victimas dirigidas o por pura diversi\u00c3\u00b3n.<br \/>\n&#8211; Utilizaci\u00c3\u00b3n de estas BotNet como servicio, es decir, para realizar alg\u00c3\u00ban ataque dirigido con una retribuci\u00c3\u00b3n de por medio.<\/p>\n<p>Por otro lado, me resulta desesperante que la mayor\u00c3\u00ada de Antivirus, antitroyanos, etc. no detecten estos software cuando se instalan en forma autom\u00c3\u00a1tica. Me ha pasado que teniendo un esquema de Defensa en Profundidad, un troyano lleg\u00c3\u00b3 a instalarse en una maquina cliente salteando todos los obst\u00c3\u00a1culos que se les ponen.<br \/>\nComo contramedida podemos pensar en software como el Sandboxie o similares para ejecutar Navegadores y otros software, con la posibilidad de que en la proxima infecci\u00c3\u00b3n no ataque directamente al sistema operativo y poder controlarlo.<br \/>\nPero con todo lo que podemos agregar como protecci\u00c3\u00b3n, nada puede contra la barrera final que es el usuario final, con esto quiero decir, la capacitaci\u00c3\u00b3n de los usuarios y los riesgos que pueden correr con la simple navegaci\u00c3\u00b3n en Internet. El tomar conciencia del verdadero peligro que pueden ocasionar a una empresa la infecci\u00c3\u00b3n de estos sistemas, es un parte fundamental del proceso de capacitaci\u00c3\u00b3n.<\/p>\n<p>Como peque\u00c3\u00b1a conclusi\u00c3\u00b3n, hay que realizar capacitaci\u00c3\u00b3n a los usuarios para que est\u00c3\u00a9n al tanto de estos peligros que son cada vez mas numerosos y a su vez, asegurar m\u00c3\u00a1s aun nuestros equipos para contrarestar las consecuencias de la infecci\u00c3\u00b3n.<\/p>\n<p>Link Sandboxie:<br \/>\nhttp:\/\/www.sandboxie.com\/<\/p>\n<p>Saludos,<br \/>\nLeandro Ferrari<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En este post quiero hacer alusi\u00c3\u00b3n a la facilidad de hoy en d\u00c3\u00ada de numerosas herramientas para crear BotNet. Pero lo que veo ultimamente investigando estos temas, es que existen en la red numerosos tutoriales con simples pasos para crear nuestra propia Botnet, esto permite que personas sin experiencias y sin objectivos claros de lo [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - BotNets y sus implicancias<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"BotNets y sus implicancias\",\"datePublished\":\"2008-07-17T18:15:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/\"},\"wordCount\":380,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - BotNets y sus implicancias\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2008-07-17T18:15:28+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - BotNets y sus implicancias","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"BotNets y sus implicancias","datePublished":"2008-07-17T18:15:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/"},"wordCount":380,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/","url":"https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - BotNets y sus implicancias","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2008-07-17T18:15:28+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/botnets-y-sus-implicancias\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"predecessor-version":[{"id":358,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/357\/revisions\/358"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}