{"id":20605,"date":"2020-10-12T10:31:48","date_gmt":"2020-10-12T16:31:48","guid":{"rendered":"https:\/\/otech.uaeh.edu.mx\/noti\/?p=20605"},"modified":"2020-10-12T10:32:29","modified_gmt":"2020-10-12T16:32:29","slug":"herramientas-mas-usadas-para-hacking","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/","title":{"rendered":"Herramientas m\u00e1s usadas para Hacking"},"content":{"rendered":"<p style=\"text-align: justify;\">El inter\u00e9s por el<span>\u00a0<\/span><strong><em>hacking<\/em><\/strong><span>\u00a0<\/span>ha incrementado en los \u00faltimos a\u00f1os. Es com\u00fan escuchar con m\u00e1s frecuencia que grandes corporaciones son v\u00edctimas de ciberataques, lo cual trae grandes da\u00f1os, no s\u00f3lo en la p\u00e9rdida de informaci\u00f3n, sino tambi\u00e9n de reputaci\u00f3n. Esto es debido al gran avance que hemos tenido en cuanto a transformaci\u00f3n digital se refiere. Los<span>\u00a0<\/span><strong>hackers \u00e9ticos<\/strong><span>\u00a0<\/span>cada d\u00eda son m\u00e1s buscados por empresas para detectar alguna vulnerabilidad en sus sistemas inform\u00e1ticos y bueno, es un tema que sin duda debe tener tu atenci\u00f3n.<!--more--><\/p>\n<div class=\"wp-block-image\" style=\"text-align: justify;\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-scaled.jpg\" data-src=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-scaled.jpg\" alt=\"hacking \" class=\"wp-image-759 lazyloaded\" width=\"1280\" height=\"854\" data-srcset=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-scaled.jpg 2560w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-300x200.jpg 300w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-1024x683.jpg 1024w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-768x512.jpg 768w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-1536x1024.jpg 1536w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-2048x1365.jpg 2048w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-696x464.jpg 696w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-1068x712.jpg 1068w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-1920x1280.jpg 1920w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-630x420.jpg 630w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" srcset=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-scaled.jpg 2560w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-300x200.jpg 300w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-1024x683.jpg 1024w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-768x512.jpg 768w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-1536x1024.jpg 1536w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-2048x1365.jpg 2048w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-696x464.jpg 696w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-1068x712.jpg 1068w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-1920x1280.jpg 1920w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-1-1-630x420.jpg 630w\" \/><\/figure>\n<\/div>\n<p style=\"text-align: justify;\">Es por ello, que es bueno estar informado en cuanto a las<span>\u00a0<\/span><strong>herramientas de<span>\u00a0<\/span><\/strong><strong><em>hacking<\/em><\/strong><span>\u00a0<\/span>que existen y que son utilizadas por los profesionales de la<span>\u00a0<\/span><strong>seguridad Inform\u00e1tica<\/strong>. As\u00ed que, si est\u00e1s leyendo este art\u00edculo, quiero asumir que eres una persona que quiere tener una idea de las herramientas existentes y que quiz\u00e1 quieras probarlas para aprender o para auditar tus infraestructuras de seguridad. Por lo cual, este art\u00edculo est\u00e1 realizado \u00fanicamente con<span>\u00a0<\/span><strong>fines educativos<\/strong><span>\u00a0<\/span>y no para fomentar pr\u00e1cticas maliciosas ni pirater\u00eda inform\u00e1tica.<\/p>\n<p style=\"text-align: justify;\">El listado de herramientas de hacking que te presentar\u00e9 a continuaci\u00f3n, son gratuitas y se pueden descargar f\u00e1cilmente en Internet.<\/p>\n<h2 style=\"text-align: justify;\">Metasploit<\/h2>\n<p style=\"text-align: justify;\">Una de las herramientas de hacking m\u00e1s conocidas en el mundo de la ciberseguridad es<span>\u00a0<\/span><strong>Metasploit<\/strong>, un software que re\u00fane un conjunto de<span>\u00a0<\/span><em>exploits<\/em>, es decir, una librer\u00eda con todos los defectos conocidos y las vulnerabilidades existentes en el software, plataformas, servidores, sistemas operativos, CMS (<em>Content Management System<\/em>), bases de datos, etc\u00e9tera.<\/p>\n<p style=\"text-align: justify;\">Metasploit es un software de c\u00f3digo abierto (<em>open source<\/em>) y puede ser utilizado tanto para actividades legales como ilegales. Permite escanear, por ejemplo, un servidor web para encontrar todas sus vulnerabilidades y puntos d\u00e9biles. A esto se le llama<span>\u00a0<\/span><strong><em>pentesting<\/em><\/strong>.<\/p>\n<p style=\"text-align: justify;\">El canal de Youtube de Metasploit es el mejor lugar para aprender y practicar la herramienta:<span>\u00a0<\/span><a href=\"https:\/\/www.youtube.com\/channel\/UCx4d2aRIfxfEUdS_5YIYKPg\"><strong>Metasploit<\/strong><\/a><\/p>\n<h2 style=\"text-align: justify;\">Nmap<\/h2>\n<div class=\"td-a-ad id_inline_ad0 id_ad_content-horiz-center\" style=\"text-align: justify;\">\n<p><span class=\"td-adspot-title\">&#8211; Anuncio &#8211;<\/span><\/p>\n<div id=\"Talent-Republic_middle_Leaderboard_1\"><\/div>\n<\/div>\n<p style=\"text-align: justify;\">\u00bfViste la pel\u00edcula \u201c<em>Matrix Reloaded<\/em>\u201d? Ah\u00ed Trinity usa Nmap y realiza un escaneo de puertos a una m\u00e1quina, encontrando un servidor SSH vulnerable, y mediante un exploit gana acceso como root, consiguiendo provocar un inmenso apag\u00f3n. Nmap est\u00e1 disponible para Windows, Mac OS X, Linux, BSD y Solaris, entre otros sistemas operativos.<\/p>\n<p style=\"text-align: justify;\">Es una de las herramientas de hacking de c\u00f3digo abierto para explorar una red inform\u00e1tica y auditar su seguridad. Est\u00e1 dise\u00f1ado para<span>\u00a0<\/span><strong>escanear r\u00e1pidamente gamas enteras de redes inform\u00e1ticas<\/strong><span>\u00a0<\/span>y es utilizado sobre todo por los administradores de redes, principalmente para supervisar las m\u00e1quinas dentro de una red (LAN) y otras operaciones administrativas.<\/p>\n<div class=\"wp-block-image\" style=\"text-align: justify;\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-2.png\" data-src=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-2.png\" alt=\"hacking\" class=\"wp-image-755 lazyloaded\" data-srcset=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-2.png 830w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-2-300x139.png 300w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-2-768x355.png 768w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-2-696x322.png 696w\" sizes=\"(max-width: 830px) 100vw, 830px\" srcset=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-2.png 830w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-2-300x139.png 300w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-2-768x355.png 768w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-2-696x322.png 696w\" \/><\/figure>\n<\/div>\n<p style=\"text-align: justify;\">Puede detectar puertos abiertos, identificar servicios alojados y obtener informaci\u00f3n sobre el sistema operativo de una computadora remota, y es exactamente ah\u00ed donde se convierte en una de las herramientas m\u00e1s utilizadas por los hackers.<\/p>\n<p style=\"text-align: justify;\">Volviendo al tema de las pel\u00edculas que tocan los temas de hacking, esta herramienta tambi\u00e9n sali\u00f3 en la pel\u00edcula \u201c<em>Die Hard\u201d<\/em><span>\u00a0<\/span>y en la pel\u00edcula tailandesa \u201c<em>13: Games of Death<\/em>\u201d en donde un inform\u00e1tico usa este programa para penetrar en el servidor de un sitio web.<\/p>\n<p style=\"text-align: justify;\">En la<span>\u00a0<\/span><a href=\"https:\/\/nmap.org\/\">p\u00e1gina web oficial de Nmap<\/a>, encontrar\u00e1s una gu\u00eda de instalaci\u00f3n y un enlace de descarga, as\u00ed como una gu\u00eda de referencia para todos los comandos posibles con explicaciones detalladas.<\/p>\n<h2 style=\"text-align: justify;\">Acunetix WVS<\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.acunetix.com\/vulnerability-scanner\/\">Acunetix Web Vulnerability Software<\/a>, es un software que<span>\u00a0<\/span><strong>escanea sitios web<\/strong><span>\u00a0<\/span>para<span>\u00a0<\/span><strong>encontrar vulnerabilidades y fallas<span>\u00a0<\/span><\/strong>que permiten el hacking para el control y el acceso a los archivos de un sitio web.<\/p>\n<div class=\"td-a-ad id_inline_ad1 id_ad_content-horiz-center\" style=\"text-align: justify;\">\n<p><span class=\"td-adspot-title\">&#8211; Anuncio &#8211;<\/span><\/p>\n<div id=\"Talent-Republic_middle_Leaderboard_2\"><\/div>\n<\/div>\n<p style=\"text-align: justify;\">Esta herramienta multi-hilo escanea un sitio web probando varios m\u00e9todos de penetraci\u00f3n como el<span>\u00a0<\/span><em>Cross Site Scripting<span>\u00a0<\/span><\/em>(abreviado como XSS) y la inyecci\u00f3n SQL. Este tipo de fallo de seguridad de los sitios web permite a un atacante inyectar contenido en una p\u00e1gina del sitio web en cuesti\u00f3n o en su base de datos, provocando acciones en los navegadores web que visitan el sitio, como el robo de cookies y sesiones del navegador o incluso de credenciales de usuario.<\/p>\n<p style=\"text-align: justify;\">Acunetix est\u00e1 disponible para Windows XP y todas las versiones superiores hasta Windows 10.<\/p>\n<figure class=\"wp-block-embed-youtube aligncenter wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\" style=\"text-align: justify;\">\n<div class=\"wp-block-embed__wrapper\">https:\/\/youtu.be\/etK2nZxfzf8<\/div>\n<\/figure>\n<h2 style=\"text-align: justify;\">Wireshark<\/h2>\n<p style=\"text-align: justify;\">El m\u00e1s antiguo de los<span>\u00a0<\/span><strong>analizadores de tramas y paquetes de red<\/strong><span>\u00a0<\/span>desde 1998. Ha sido completamente redise\u00f1ado en 2015 y su interfaz se ha hecho m\u00e1s ligera y r\u00e1pida ya sea en Linux, Windows o Mac OS X.<\/p>\n<div class=\"wp-block-image\" style=\"text-align: justify;\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-3.png\" data-src=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-3.png\" alt=\"hacking\" class=\"wp-image-756 lazyloaded\" data-srcset=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-3.png 766w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-3-300x237.png 300w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-3-696x549.png 696w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-3-533x420.png 533w\" sizes=\"(max-width: 766px) 100vw, 766px\" srcset=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-3.png 766w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-3-300x237.png 300w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-3-696x549.png 696w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-3-533x420.png 533w\" \/><\/figure>\n<\/div>\n<p style=\"text-align: justify;\">Gracias a Wireshark, puedes capturar todo lo que se mueve en la red en t\u00e9rminos de paquetes con todos los detalles como el tipo de protocolo utilizado, la fuente de los datos capturados, el destino de estos datos y si hay datos no encriptados que todav\u00eda circulan en tu red.<\/p>\n<h2 style=\"text-align: justify;\">John the Ripper<\/h2>\n<h4 style=\"text-align: justify;\"><strong>Una herramienta para descifrar contrase\u00f1as<\/strong><\/h4>\n<p style=\"text-align: justify;\">Es un programa multiplataforma y de c\u00f3digo abierto distribuido principalmente en formato de c\u00f3digo fuente. Uno de los programas de prueba de contrase\u00f1as m\u00e1s utilizados, detecta autom\u00e1ticamente los tipos de fragmentaci\u00f3n de contrase\u00f1as e incluye una herramienta de descifrado personalizable; adem\u00e1s permite a los administradores de sistemas comprobar que las contrase\u00f1as de los usuarios son suficientemente buenas.<\/p>\n<div class=\"wp-block-image\" style=\"text-align: justify;\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4.jpg\" data-src=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4.jpg\" alt=\"hacking\" class=\"wp-image-757 lazyloaded\" data-srcset=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4.jpg 800w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4-300x165.jpg 300w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4-768x422.jpg 768w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4-696x383.jpg 696w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4-764x420.jpg 764w\" sizes=\"(max-width: 800px) 100vw, 800px\" srcset=\"https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4.jpg 800w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4-300x165.jpg 300w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4-768x422.jpg 768w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4-696x383.jpg 696w, https:\/\/www.talent-republic.tv\/wp-content\/uploads\/2020\/05\/IMAGEN-4-764x420.jpg 764w\" \/><\/figure>\n<\/div>\n<p style=\"text-align: justify;\">Evidentemente esta lista se queda corta<span>\u00a0<\/span><em>versus<\/em><span>\u00a0<\/span>todas las herramientas que existen, sin embargo, espero que te sea \u00fatil. Si conoces alguna otra herramienta, comp\u00e1rtela en los comentarios de esta publicaci\u00f3n, es probable que la agregue en una segunda parte de este art\u00edculo.<\/p>\n<p style=\"text-align: justify;\">Fuente:<\/p>\n<p tab-interval=\"36pt\">Salazar, N. (2020, 1 septiembre). Herramientas m\u00e1s usadas para Hacking. Recuperado 12 de octubre de 2020, de https:\/\/www.talent-republic.tv\/developer\/desarrollo-de-software\/herramientas-mas-usadas-para-hacking\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El inter\u00e9s por el\u00a0hacking\u00a0ha incrementado en los \u00faltimos a\u00f1os. Es com\u00fan escuchar con m\u00e1s frecuencia que grandes corporaciones son v\u00edctimas de ciberataques, lo cual trae grandes da\u00f1os, no s\u00f3lo en la p\u00e9rdida de informaci\u00f3n, sino tambi\u00e9n de reputaci\u00f3n. Esto es debido al gran avance que hemos tenido en cuanto a transformaci\u00f3n digital se refiere. Los\u00a0hackers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":20606,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[408,3],"tags":[],"class_list":["post-20605","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sistemas-operativos","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Herramientas m\u00e1s usadas para Hacking - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Herramientas m\u00e1s usadas para Hacking - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"El inter\u00e9s por el\u00a0hacking\u00a0ha incrementado en los \u00faltimos a\u00f1os. Es com\u00fan escuchar con m\u00e1s frecuencia que grandes corporaciones son v\u00edctimas de ciberataques, lo cual trae grandes da\u00f1os, no s\u00f3lo en la p\u00e9rdida de informaci\u00f3n, sino tambi\u00e9n de reputaci\u00f3n. Esto es debido al gran avance que hemos tenido en cuanto a transformaci\u00f3n digital se refiere. Los\u00a0hackers [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-12T16:31:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-12T16:32:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2020\/10\/Markus-Spiske-Unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Herramientas m\u00e1s usadas para Hacking\",\"datePublished\":\"2020-10-12T16:31:48+00:00\",\"dateModified\":\"2020-10-12T16:32:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/\"},\"wordCount\":955,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2020\/10\/Markus-Spiske-Unsplash-scaled.jpg\",\"articleSection\":[\"Sistemas Operativos\",\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/\",\"name\":\"Herramientas m\u00e1s usadas para Hacking - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2020\/10\/Markus-Spiske-Unsplash-scaled.jpg\",\"datePublished\":\"2020-10-12T16:31:48+00:00\",\"dateModified\":\"2020-10-12T16:32:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2020\/10\/Markus-Spiske-Unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2020\/10\/Markus-Spiske-Unsplash-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Herramientas m\u00e1s usadas para Hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Herramientas m\u00e1s usadas para Hacking - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/","og_locale":"en_US","og_type":"article","og_title":"Herramientas m\u00e1s usadas para Hacking - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"El inter\u00e9s por el\u00a0hacking\u00a0ha incrementado en los \u00faltimos a\u00f1os. Es com\u00fan escuchar con m\u00e1s frecuencia que grandes corporaciones son v\u00edctimas de ciberataques, lo cual trae grandes da\u00f1os, no s\u00f3lo en la p\u00e9rdida de informaci\u00f3n, sino tambi\u00e9n de reputaci\u00f3n. Esto es debido al gran avance que hemos tenido en cuanto a transformaci\u00f3n digital se refiere. Los\u00a0hackers [&hellip;]","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2020-10-12T16:31:48+00:00","article_modified_time":"2020-10-12T16:32:29+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2020\/10\/Markus-Spiske-Unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Herramientas m\u00e1s usadas para Hacking","datePublished":"2020-10-12T16:31:48+00:00","dateModified":"2020-10-12T16:32:29+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/"},"wordCount":955,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2020\/10\/Markus-Spiske-Unsplash-scaled.jpg","articleSection":["Sistemas Operativos","Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/","name":"Herramientas m\u00e1s usadas para Hacking - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2020\/10\/Markus-Spiske-Unsplash-scaled.jpg","datePublished":"2020-10-12T16:31:48+00:00","dateModified":"2020-10-12T16:32:29+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2020\/10\/Markus-Spiske-Unsplash-scaled.jpg","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2020\/10\/Markus-Spiske-Unsplash-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/herramientas-mas-usadas-para-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Herramientas m\u00e1s usadas para Hacking"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/20605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=20605"}],"version-history":[{"count":2,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/20605\/revisions"}],"predecessor-version":[{"id":20608,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/20605\/revisions\/20608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/20606"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=20605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=20605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=20605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}