{"id":5362,"date":"2011-09-05T02:21:46","date_gmt":"2011-09-05T05:21:46","guid":{"rendered":"http:\/\/brainlabs.com.ar\/novedad\/?p=5362"},"modified":"2022-11-28T11:52:36","modified_gmt":"2022-11-28T14:52:36","slug":"top-de-tecnicas-de-hacking-web-de-2011","status":"publish","type":"post","link":"https:\/\/www.brainlabs.com\/novedad\/top-de-tecnicas-de-hacking-web-de-2011\/","title":{"rendered":"Top de t\u00e9cnicas de hacking web de 2011"},"content":{"rendered":"<p>El experto <a href=\"http:\/\/jeremiahgrossman.blogspot.com\/2011\/02\/top-ten-web-hacking-techniques-of-2011.html\" target=\"_blank\" rel=\"noopener\">Jeremiah Grossman ha recogido<\/a> las nuevas t\u00e9cnicas de ataque web del 2011 ya que <em>\u00abcada a\u00f1o la comunidad de seguridad Web produce y publica una cantidad impresionante de nuevas t\u00e9cnicas de hacking. M\u00e1s all\u00e1 de los casos de vulnerabilidades individuales identificados con un n\u00famero CVE, estamos hablando de nuevo m\u00e9todos reales y creativos de atacar una web. Esta lista promueve el intercambio de informaci\u00f3n, ofrece un sistema centralizado de base de conocimientos, y reconoce a los investigadores que contribuyen con su excelente trabajo\u00bb<\/em>.<\/p>\n<p><strong>Lista actual de 2011<\/strong><\/p>\n<ol>\n<li>Bypassing Flash\u2019s local-with-filesystem Sandbox<\/li>\n<li><a href=\"https:\/\/grepular.com\/Abusing_HTTP_Status_Codes_to_Expose_Private_Information\">Abusing HTTP Status Codes to Expose Private Information<\/a><\/li>\n<li>SpyTunes: Find out what iTunes music someone else has<\/li>\n<li>CSRF: Flash + 307 redirect = Game Over<\/li>\n<li>Close encounters of the third kind (client-side JavaScript vulnerabilities)<\/li>\n<\/ol>\n<p><strong>A\u00f1os anteriores<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/jeremiahgrossman.blogspot.com\/2011\/01\/top-ten-web-hacking-techniques-of-2010.html\">2010<\/a> &#8211; &#8216;Padding Oracle&#8217; Crypto Attack<\/li>\n<li><a href=\"http:\/\/jeremiahgrossman.blogspot.com\/2010\/01\/top-ten-web-hacking-techniques-of-2009.html\">2009<\/a> &#8211; Creating a rogue CA certificate<\/li>\n<li><a href=\"http:\/\/jeremiahgrossman.blogspot.com\/2009\/02\/top-ten-web-hacking-techniques-of-2008.html\">2008<\/a> &#8211; GIFAR<\/li>\n<li><a href=\"http:\/\/jeremiahgrossman.blogspot.com\/2008\/01\/top-ten-web-hacks-of-2007-official.html\">2007<\/a> &#8211; XSS Vulnerabilities in Common Shockwave Flash Files<\/li>\n<li><a href=\"http:\/\/jeremiahgrossman.blogspot.com\/2006\/12\/top-10-web-hacks-of-2006.html\">2006<\/a> &#8211; Web Browser Intranet Hacking \/ Port Scanning<\/li>\n<\/ul>\n<p>Fuente: <a href=\"http:\/\/jeremiahgrossman.blogspot.com\/2011\/02\/top-ten-web-hacking-techniques-of-2011.html\">Jeremiah Grossman<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El experto Jeremiah Grossman ha recogido las nuevas t\u00e9cnicas de ataque web del 2011 ya&#8230;<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[48],"tags":[],"class_list":["post-5362","post","type-post","status-publish","format-standard","hentry","category-seguridad"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","covernews-featured":"","covernews-medium":""},"author_info":{"display_name":"Sergio Zamenfeld","author_link":"https:\/\/www.brainlabs.com\/novedad\/author\/sergio\/"},"category_info":"<a href=\"https:\/\/www.brainlabs.com\/novedad\/category\/seguridad\/\" rel=\"category tag\">Seguridad<\/a>","tag_info":"Seguridad","comment_count":"0","_links":{"self":[{"href":"https:\/\/www.brainlabs.com\/novedad\/wp-json\/wp\/v2\/posts\/5362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.brainlabs.com\/novedad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.brainlabs.com\/novedad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.brainlabs.com\/novedad\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.brainlabs.com\/novedad\/wp-json\/wp\/v2\/comments?post=5362"}],"version-history":[{"count":4,"href":"https:\/\/www.brainlabs.com\/novedad\/wp-json\/wp\/v2\/posts\/5362\/revisions"}],"predecessor-version":[{"id":7134,"href":"https:\/\/www.brainlabs.com\/novedad\/wp-json\/wp\/v2\/posts\/5362\/revisions\/7134"}],"wp:attachment":[{"href":"https:\/\/www.brainlabs.com\/novedad\/wp-json\/wp\/v2\/media?parent=5362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.brainlabs.com\/novedad\/wp-json\/wp\/v2\/categories?post=5362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.brainlabs.com\/novedad\/wp-json\/wp\/v2\/tags?post=5362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}