
{"id":582,"date":"2009-08-30T19:52:44","date_gmt":"2009-08-30T22:52:44","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=582"},"modified":"2009-08-30T19:52:44","modified_gmt":"2009-08-30T22:52:44","slug":"pentbox-1-0-1-beta","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/","title":{"rendered":"PenTBox 1.0.1 Beta"},"content":{"rendered":"<p><a href=\"http:\/\/www.pentbox.net\/\">PenTBox<\/a>, es una <span style=\"font-weight: bold;\">Suite de seguridad orientada a Pentesting<\/span> y programada en Ruby, licenciada bajo GNU GPL3. Esta Suite es multiplataforma aunque fue pensada para entornos GNU\/Linux. Est\u00e1 estructurada en un conjunto de programas que pueden ser ejecutados de forma individual (con independencia de la Suite) lo que permite la integraci\u00f3n de nuevos desarrollos que aporte la comunidad de desarrolladores.<\/p>\n<div style=\"text-align: justify;\">La Suite incluye las siguientes funciones:<\/div>\n<ul style=\"text-align: justify;\">\n<li>Cracking de los algoritmos hash MD5, SHA1, SHA256 y SHA512 mediante fuerza bruta num\u00e9rica.<\/li>\n<li>Creador r\u00e1pido de Honeypots.<\/li>\n<li>Generador de contrase\u00f1as seguras ante ataques de fuerza bruta y diccionario.<\/li>\n<li>Generadores de tr\u00e1fico masivo en la red para probar posibles denegaciones de servicio.<\/li>\n<li>Escaneo de puertos.<\/li>\n<li>Otras aplicaciones complementarias<\/li>\n<\/ul>\n<p>Por ejemplo queremos crear un Honeypot que simule abierto el puerto 80.<\/p>\n<div style=\"text-align: center;\">\n<div style=\"text-align: left;\"><a href=\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphCmq40d8I\/AAAAAAAAAOU\/RuCljWTc-Ow\/s1600-h\/pent1.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5375119387381757890\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 243px;\" src=\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphCmq40d8I\/AAAAAAAAAOU\/RuCljWTc-Ow\/s400\/pent1.png\" border=\"0\" alt=\"\" \/><\/a><br \/>\nEscaneamos que servicios est\u00e1n activos:<\/div>\n<\/div>\n<div style=\"text-align: center;\"><a href=\"http:\/\/2.bp.blogspot.com\/_2hGRdOsjT_o\/Spg7xDPfL0I\/AAAAAAAAAN8\/7femVRrHsTo\/s1600-h\/pent3.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5375111869136580418\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 397px;\" src=\"http:\/\/2.bp.blogspot.com\/_2hGRdOsjT_o\/Spg7xDPfL0I\/AAAAAAAAAN8\/7femVRrHsTo\/s400\/pent3.png\" border=\"0\" alt=\"\" \/><\/a><\/div>\n<div style=\"text-align: center;\">\n<div style=\"text-align: left;\">Creamos un Honeypot que simule abierto el puerto 80:<\/div>\n<div style=\"text-align: left;\"><a href=\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphC3itoW0I\/AAAAAAAAAOc\/VGPLSPyuZCQ\/s1600-h\/pent4.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5375119677245119298\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 386px; height: 400px;\" src=\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphC3itoW0I\/AAAAAAAAAOc\/VGPLSPyuZCQ\/s400\/pent4.png\" border=\"0\" alt=\"\" \/><\/a><br \/>\nVolvemos a escanear la m\u00e1quina:<\/div>\n<\/div>\n<div style=\"text-align: center;\"><a href=\"http:\/\/2.bp.blogspot.com\/_2hGRdOsjT_o\/Spg7tpyZ4CI\/AAAAAAAAAN0\/V8RA4yb-h3o\/s1600-h\/pent2.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5375111810764103714\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 392px; height: 400px;\" src=\"http:\/\/2.bp.blogspot.com\/_2hGRdOsjT_o\/Spg7tpyZ4CI\/AAAAAAAAAN0\/V8RA4yb-h3o\/s400\/pent2.png\" border=\"0\" alt=\"\" \/><\/a><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-size: 100%;\">Hay m\u00e1s informaci\u00f3n en la <a href=\"http:\/\/zombiesaresexy.wordpress.com\/2009\/08\/14\/presentacion-de-pentbox\/\">web<\/a> de uno de los autores del proyecto.<\/span><\/div>\n<div style=\"text-align: justify;\"><span style=\"font-size: 100%;\">Fuente: SecurityByDefault<br \/>\n<\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>PenTBox, es una Suite de seguridad orientada a Pentesting y programada en Ruby, licenciada bajo GNU GPL3. Esta Suite es multiplataforma aunque fue pensada para entornos GNU\/Linux. Est\u00e1 estructurada en un conjunto de programas que pueden ser ejecutados de forma individual (con independencia de la Suite) lo que permite la integraci\u00f3n de nuevos desarrollos que [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-582","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - PenTBox 1.0.1 Beta<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"PenTBox 1.0.1 Beta\",\"datePublished\":\"2009-08-30T22:52:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/\"},\"wordCount\":170,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphCmq40d8I\/AAAAAAAAAOU\/RuCljWTc-Ow\/s400\/pent1.png\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - PenTBox 1.0.1 Beta\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphCmq40d8I\/AAAAAAAAAOU\/RuCljWTc-Ow\/s400\/pent1.png\",\"datePublished\":\"2009-08-30T22:52:44+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/#primaryimage\",\"url\":\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphCmq40d8I\/AAAAAAAAAOU\/RuCljWTc-Ow\/s400\/pent1.png\",\"contentUrl\":\"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphCmq40d8I\/AAAAAAAAAOU\/RuCljWTc-Ow\/s400\/pent1.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - PenTBox 1.0.1 Beta","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"PenTBox 1.0.1 Beta","datePublished":"2009-08-30T22:52:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/"},"wordCount":170,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/#primaryimage"},"thumbnailUrl":"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphCmq40d8I\/AAAAAAAAAOU\/RuCljWTc-Ow\/s400\/pent1.png","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/","url":"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - PenTBox 1.0.1 Beta","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/#primaryimage"},"thumbnailUrl":"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphCmq40d8I\/AAAAAAAAAOU\/RuCljWTc-Ow\/s400\/pent1.png","datePublished":"2009-08-30T22:52:44+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/pentbox-1-0-1-beta\/#primaryimage","url":"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphCmq40d8I\/AAAAAAAAAOU\/RuCljWTc-Ow\/s400\/pent1.png","contentUrl":"http:\/\/1.bp.blogspot.com\/_2hGRdOsjT_o\/SphCmq40d8I\/AAAAAAAAAOU\/RuCljWTc-Ow\/s400\/pent1.png"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=582"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/582\/revisions"}],"predecessor-version":[{"id":583,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/582\/revisions\/583"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}