Cincuenta Sombras del Gray Hat Hacking
Transcript of Cincuenta Sombras del Gray Hat Hacking
![Page 1: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/1.jpg)
Ing. Romeo A. Sánchez
CISSP CEH CCNA CCSI SCJP SCMAD SCSA MCP ITIL TOGAF
@knaverit
![Page 2: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/2.jpg)
THE FOLLOWING TALK HAS BEEN APPROVED FOR
ALL AUDIENCES
BY THE SPEAKER’S MOM (@KNAVERIT’S MOM)
![Page 3: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/3.jpg)
![Page 4: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/4.jpg)
Hacker.
n. A person who delights in having an intimate understanding of the internalworkings of a system, computers and
computer networks in particular. The term is often misused in a pejorative context, where
"cracker" would be the correct term.
RFC 1392 “Internet Users' Glossary” (1993)
https://tools.ietf.org/html/rfc1392
![Page 5: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/5.jpg)
Hacker.
s. Una persona que se deleita en tener un entendimiento íntimo del funcionamiento
interno de los sistemas, computadoras y redes de computadoras. El término es usado a menudo en un contexto peyorativo, donde
"cracker" debería ser el término correcto.
RFC 1392 “Internet Users' Glossary” (1993)
https://tools.ietf.org/html/rfc1392
![Page 6: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/6.jpg)
hacker cracker
lamer
phreaker
white-hatscript-kiddie
security professional
gray-hatethical hacker
hacktivist
black-hat
![Page 7: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/7.jpg)
Hackers en el cine
![Page 8: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/8.jpg)
Los hackers en el cine
“WAR GAMES” (1983)
![Page 9: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/9.jpg)
Los hackers en el cine
“HACKERS” (1995)
![Page 10: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/10.jpg)
Los hackers en el cine
“THE NET” (1995)
![Page 11: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/11.jpg)
Los hackers en el cine
“SWORDFISH” (2001)
![Page 12: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/12.jpg)
Los hackers en el cine
“ANTITRUST” (2001)
![Page 13: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/13.jpg)
Los hackers en el cine
“FIREWALL” (2006)
![Page 14: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/14.jpg)
Los hackers en el cine
“UNTRACEABLE” (2008)
![Page 15: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/15.jpg)
Los hackers en el cine
“UNTHINKABLE” (2010)
![Page 16: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/16.jpg)
Hackers y otros bichos
![Page 17: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/17.jpg)
Phreakers
![Page 18: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/18.jpg)
Script Kiddies
![Page 19: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/19.jpg)
Lamers
![Page 20: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/20.jpg)
Lamers
![Page 21: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/21.jpg)
Lamers
I hacked127.0.0.1
![Page 22: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/22.jpg)
I hacked127.0.0.1
![Page 23: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/23.jpg)
Hacktivistas
![Page 24: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/24.jpg)
Deep Web
![Page 25: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/25.jpg)
Cibercriminales
![Page 26: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/26.jpg)
Cibercriminales
![Page 27: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/27.jpg)
Cyberwarfare
![Page 28: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/28.jpg)
Bug Bounty
![Page 29: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/29.jpg)
Hackers verdaderos
![Page 30: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/30.jpg)
Charlie Miller @0xcharlie
![Page 31: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/31.jpg)
Mikko Hyppönen @mikko
![Page 32: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/32.jpg)
Ethical Hacking
![Page 33: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/33.jpg)
Un hacker no es un criminal
(a menos que lo seduzca el lado obscuro)
![Page 34: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/34.jpg)
Las herramientas del hacker
![Page 35: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/35.jpg)
Un hacker debe prepararse
![Page 36: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/36.jpg)
cookie poisoningbuffer overflow
SQL injection
remote shell executionwireless hacking
web server defacement
zero-day attack
social engineeringdirectory traversal
cross-site scripting
authentication bypass
password cracking
session hijacking
path disclosure
![Page 37: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/37.jpg)
¿Alguna pregunta?
![Page 38: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/38.jpg)
Ing. Romeo A. Sánchez
CISSP CEH CCNA CCSI SCJP SCMAD SCSA MCP ITIL TOGAF
@knaverit
![Page 39: Cincuenta Sombras del Gray Hat Hacking](https://reader030.fdocuments.us/reader030/viewer/2022012507/618407f432b9f63a915f124d/html5/thumbnails/39.jpg)
Enlaces de Interés
• El niño que se disfrazó de Christian Grey• http://www.dailyrecord.co.uk/news/weird-news/fifty-shades-
grey-mum-defends-5282936
• La historia del "hacker" de 127.0.0.1• http://sirkan.iit.bme.hu/~kapolnai/fun/bitchecker.html
• Whitepaper acerca de Deep Web• http://www.trendmicro.co.uk/media/wp/exploring-the-deep-
web-whitepaper-en.pdf
• Explicación del cartón de XKCD• http://www.explainxkcd.com/wiki/index.php/538:_Security