debilidades / vulnerabilidades protocolos de red
TRANSCRIPT
![Page 1: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/1.jpg)
@d7n0
© JHON JAIRO HERNÁNDEZ HERNÁNDEZ
Dinosaurio – Dino
Jhonjairo.hernandezœ@hackinganddefense.co
HACKING & DEFENSE SAS
© Jhon Jairo Hernández Hernández
Debilidades / Vulnerabilidades
Protocolos de Red
![Page 2: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/2.jpg)
Director Proyectos, Consultor Seguridad Informática / InformaciónInvestigador Informática ForenseAcadémico, Socio Fundador HACKING& DEFENSE SAS
#whoami
© Jhon Jairo Hernández Hernández
![Page 3: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/3.jpg)
Ataque ARP
© Jhon Jairo Hernández Hernández
![Page 4: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/4.jpg)
Ataque ARP
© Jhon Jairo Hernández Hernández
![Page 5: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/5.jpg)
Ataque ARP / MITM /DoS
© Jhon Jairo Hernández Hernández
![Page 6: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/6.jpg)
DNS Spoof.
© Jhon Jairo Hernández Hernández
![Page 7: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/7.jpg)
DNS Spoof.
© Jhon Jairo Hernández Hernández
![Page 8: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/8.jpg)
DNS Spoof.
© Jhon Jairo Hernández Hernández
![Page 9: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/9.jpg)
CAPTURA DE CREDENCIALES EN TEXTO PLANO
© Jhon Jairo Hernández Hernández
![Page 10: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/10.jpg)
CAPTURA DE CREDENCIALES EN TEXTO PLANO
© Jhon Jairo Hernández Hernández
![Page 11: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/11.jpg)
CAPTURA DE CREDENCIALES EN TEXTO PLANO
© Jhon Jairo Hernández Hernández
![Page 12: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/12.jpg)
CAPTURA TEXTO PLANO TELNET
© Jhon Jairo Hernández Hernández
![Page 13: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/13.jpg)
CAPTURA TEXTO PLANO TELNET
© Jhon Jairo Hernández Hernández
![Page 14: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/14.jpg)
CAPTURA TEXTO PLANO FTP
© Jhon Jairo Hernández Hernández
![Page 15: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/15.jpg)
Vulnerabilidades HTTP y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 16: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/16.jpg)
Vulnerabilidades del correo electrónico
© Jhon Jairo Hernández Hernández
![Page 17: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/17.jpg)
Vulnerabilidades HTTP y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 18: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/18.jpg)
Vulnerabilidades HTTP y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 19: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/19.jpg)
Vulnerabilidades HTTP y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 20: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/20.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 21: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/21.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 22: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/22.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 23: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/23.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 24: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/24.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 25: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/25.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 26: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/26.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 27: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/27.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 28: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/28.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 29: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/29.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 30: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/30.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 31: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/31.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 32: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/32.jpg)
Vulnerabilidades HTTPS y aplicativos Web
© Jhon Jairo Hernández Hernández
![Page 33: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/33.jpg)
Vulnerabilidades Cifrado DES Oracle
© Jhon Jairo Hernández Hernández
![Page 34: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/34.jpg)
Vulnerabilidades Cifrado NTLM Challenge Security Microsoft
© Jhon Jairo Hernández Hernández
![Page 35: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/35.jpg)
Vulnerabilidades Cifrado WEP
© Jhon Jairo Hernández Hernández
![Page 36: Debilidades / Vulnerabilidades Protocolos de Red](https://reader038.vdocumento.com/reader038/viewer/2022102614/55b3fae1bb61eb33488b47ab/html5/thumbnails/36.jpg)
© Jhon Jairo Hernández Hernández