{"id":627,"date":"2014-03-28T15:21:26","date_gmt":"2014-03-28T14:21:26","guid":{"rendered":"https:\/\/www.eporedia.com\/penetration-testing\/"},"modified":"2019-07-09T12:08:37","modified_gmt":"2019-07-09T11:08:37","slug":"prueba-de-penetracion","status":"publish","type":"page","link":"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/","title":{"rendered":"Prueba de Penetraci\u00f3n"},"content":{"rendered":"\n<div class=\"wp-block-uagb-section uagb-section__wrap uagb-section__background-image\" id=\"uagb-section-7ec8cab8-f32d-49df-82bb-f65bdc75593d\"><div class=\"uagb-section__overlay\"><\/div><div class=\"uagb-section__inner-wrap\">\n<div class=\"wp-block-uagb-advanced-heading entry-header\" id=\"uagb-adv-heading-4ea813d2-cdbd-4bac-8057-e5ef998a0a37\"><h1 class=\"uagb-heading-text\"><strong>PRUEBA DE PENETRACI\u00d2<\/strong><strong>N<\/strong><\/h1><p class=\"uagb-desc-text\"><\/p><\/div>\n<\/div><\/div>\n\n\n\n<section class=\"wp-block-uagb-section uagb-section__wrap uagb-section__background-undefined\" id=\"uagb-section-077d3cff-407f-4031-89a4-caaea59cbe3d\"><div class=\"uagb-section__overlay\"><\/div><div class=\"uagb-section__inner-wrap\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\u00bfEs realmente seguro su sitio web de comercio electr\u00f3nico? \u00bfPueden sus clientes confiar en usted para procesar sus transacciones de forma segura y almacenar sus detalles sin revelarlos accidentalmente? \u00bfEst\u00e1n sus defensas del per\u00edmetro altamente capacitadas para repeler las hordas de piratas cibern\u00e9ticos con objetivos espec\u00edficos?\n\n<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>El an\u00e1lisis de la aplicaci\u00f3n de seguridad de la caja negra, es una manera r\u00e1pida y eficaz para evaluar una aplicaci\u00f3n o la exposici\u00f3n a los ataques de una red. Nuestro enfoque en la caja negra aprovecha las capacidades de acceso a una instancia en vivo de la aplicaci\u00f3n, para determinar la amenaza tanto de los extra\u00f1os no autorizados obteniendo acceso a la aplicaci\u00f3n, como la de los usuarios leg\u00edtimos de la aplicaci\u00f3n comprometiendo los controles de seguridad dentro de la aplicaci\u00f3n.<\/p>\n\n\n\n<p>En una revisi\u00f3n de la caja negra, el equipo de pruebas no aprovecha ninguna informaci\u00f3n acerca de la aplicaci\u00f3n, distinta de la que est\u00e1 disponible para los usuarios leg\u00edtimos. Esto reduce no s\u00f3lo el tiempo total requerido para llevar a cabo y preparar la prueba, sino tambi\u00e9n simula lo que un atacante real ser\u00eda capaz de enumerar de forma remota desde la aplicaci\u00f3n. Nuestra metodolog\u00eda utiliza un enfoque estructurado, que nos permite en primer lugar descubrir y aprender sobre los componentes disponibles de las aplicaciones, probar sistem\u00e1ticamente cada componente de exposiciones potenciales, y luego explotar selectivamente las vulnerabilidades espec\u00edficas de alto riesgo.<\/p>\n\n\n\n<p>Al final de cada evaluaci\u00f3n de la prueba, entregamos un informe que describe detalles sobre cada uno de los riesgos de seguridad que son identificados, junto con un plan estrat\u00e9gico de medidas correctivas para enfrentar los problemas identificados. En el informe hay una gu\u00eda detallada de los ensayos que se realizaron durante la evaluaci\u00f3n, incluyendo capturas de pantalla que ilustran cada paso.<\/p>\n\n\n\n<p> <\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-627","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Prueba de Penetraci\u00f3n - Eporedia<\/title>\n<meta name=\"description\" content=\"\u00bfEs realmente seguro su sitio web de comercio electr\u00f3nico? \u00bfPueden sus clientes confiar en usted para procesar sus transacciones de forma segura y almacenar sus detalles sin revelarlos accidentalmente? \u00bfEst\u00e1n sus defensas del per\u00edmetro altamente capacitadas para repeler las hordas de piratas cibern\u00e9ticos con objetivos espec\u00edficos?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prueba de Penetraci\u00f3n - Eporedia\" \/>\n<meta property=\"og:description\" content=\"\u00bfEs realmente seguro su sitio web de comercio electr\u00f3nico? \u00bfPueden sus clientes confiar en usted para procesar sus transacciones de forma segura y almacenar sus detalles sin revelarlos accidentalmente? \u00bfEst\u00e1n sus defensas del per\u00edmetro altamente capacitadas para repeler las hordas de piratas cibern\u00e9ticos con objetivos espec\u00edficos?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/\" \/>\n<meta property=\"og:site_name\" content=\"Eporedia\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-09T11:08:37+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/\",\"url\":\"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/\",\"name\":\"Prueba de Penetraci\u00f3n - Eporedia\",\"isPartOf\":{\"@id\":\"https:\/\/www.eporedia.com\/es\/#website\"},\"datePublished\":\"2014-03-28T14:21:26+00:00\",\"dateModified\":\"2019-07-09T11:08:37+00:00\",\"description\":\"\u00bfEs realmente seguro su sitio web de comercio electr\u00f3nico? \u00bfPueden sus clientes confiar en usted para procesar sus transacciones de forma segura y almacenar sus detalles sin revelarlos accidentalmente? \u00bfEst\u00e1n sus defensas del per\u00edmetro altamente capacitadas para repeler las hordas de piratas cibern\u00e9ticos con objetivos espec\u00edficos?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.eporedia.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prueba de Penetraci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eporedia.com\/es\/#website\",\"url\":\"https:\/\/www.eporedia.com\/es\/\",\"name\":\"Eporedia\",\"description\":\"Your IT Security Partners\",\"publisher\":{\"@id\":\"https:\/\/www.eporedia.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eporedia.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eporedia.com\/es\/#organization\",\"name\":\"Eporedia\",\"url\":\"https:\/\/www.eporedia.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.eporedia.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.eporedia.com\/wp-content\/uploads\/2019\/06\/cropped-Logo_eporedia1-e1396441304476-1.png\",\"contentUrl\":\"https:\/\/www.eporedia.com\/wp-content\/uploads\/2019\/06\/cropped-Logo_eporedia1-e1396441304476-1.png\",\"width\":260,\"height\":73,\"caption\":\"Eporedia\"},\"image\":{\"@id\":\"https:\/\/www.eporedia.com\/es\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prueba de Penetraci\u00f3n - Eporedia","description":"\u00bfEs realmente seguro su sitio web de comercio electr\u00f3nico? \u00bfPueden sus clientes confiar en usted para procesar sus transacciones de forma segura y almacenar sus detalles sin revelarlos accidentalmente? \u00bfEst\u00e1n sus defensas del per\u00edmetro altamente capacitadas para repeler las hordas de piratas cibern\u00e9ticos con objetivos espec\u00edficos?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/","og_locale":"es_ES","og_type":"article","og_title":"Prueba de Penetraci\u00f3n - Eporedia","og_description":"\u00bfEs realmente seguro su sitio web de comercio electr\u00f3nico? \u00bfPueden sus clientes confiar en usted para procesar sus transacciones de forma segura y almacenar sus detalles sin revelarlos accidentalmente? \u00bfEst\u00e1n sus defensas del per\u00edmetro altamente capacitadas para repeler las hordas de piratas cibern\u00e9ticos con objetivos espec\u00edficos?","og_url":"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/","og_site_name":"Eporedia","article_modified_time":"2019-07-09T11:08:37+00:00","twitter_misc":{"Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/","url":"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/","name":"Prueba de Penetraci\u00f3n - Eporedia","isPartOf":{"@id":"https:\/\/www.eporedia.com\/es\/#website"},"datePublished":"2014-03-28T14:21:26+00:00","dateModified":"2019-07-09T11:08:37+00:00","description":"\u00bfEs realmente seguro su sitio web de comercio electr\u00f3nico? \u00bfPueden sus clientes confiar en usted para procesar sus transacciones de forma segura y almacenar sus detalles sin revelarlos accidentalmente? \u00bfEst\u00e1n sus defensas del per\u00edmetro altamente capacitadas para repeler las hordas de piratas cibern\u00e9ticos con objetivos espec\u00edficos?","breadcrumb":{"@id":"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.eporedia.com\/es\/prueba-de-penetracion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eporedia.com\/es\/"},{"@type":"ListItem","position":2,"name":"Prueba de Penetraci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/www.eporedia.com\/es\/#website","url":"https:\/\/www.eporedia.com\/es\/","name":"Eporedia","description":"Your IT Security Partners","publisher":{"@id":"https:\/\/www.eporedia.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eporedia.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.eporedia.com\/es\/#organization","name":"Eporedia","url":"https:\/\/www.eporedia.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.eporedia.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.eporedia.com\/wp-content\/uploads\/2019\/06\/cropped-Logo_eporedia1-e1396441304476-1.png","contentUrl":"https:\/\/www.eporedia.com\/wp-content\/uploads\/2019\/06\/cropped-Logo_eporedia1-e1396441304476-1.png","width":260,"height":73,"caption":"Eporedia"},"image":{"@id":"https:\/\/www.eporedia.com\/es\/#\/schema\/logo\/image\/"}}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"admin_eporedia","author_link":"https:\/\/www.eporedia.com\/es\/author\/admin_eporedia\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.eporedia.com\/es\/wp-json\/wp\/v2\/pages\/627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eporedia.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.eporedia.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.eporedia.com\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eporedia.com\/es\/wp-json\/wp\/v2\/comments?post=627"}],"version-history":[{"count":5,"href":"https:\/\/www.eporedia.com\/es\/wp-json\/wp\/v2\/pages\/627\/revisions"}],"predecessor-version":[{"id":1007,"href":"https:\/\/www.eporedia.com\/es\/wp-json\/wp\/v2\/pages\/627\/revisions\/1007"}],"wp:attachment":[{"href":"https:\/\/www.eporedia.com\/es\/wp-json\/wp\/v2\/media?parent=627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}