{"id":176,"date":"2014-03-22T10:09:39","date_gmt":"2014-03-22T10:21:29","guid":{"rendered":"https:\/\/8dbdeBacktrack_5_R2.png"},"modified":"2015-07-16T21:11:00","modified_gmt":"2015-07-17T03:11:00","slug":"tutorialcurso-de-backtrack-5-en-pdf-y-espanol","status":"publish","type":"post","link":"https:\/\/emanuelpaxtian.com\/blog\/tutorialcurso-de-backtrack-5-en-pdf-y-espanol\/","title":{"rendered":"Tutorial\/curso de Backtrack 5 en pdf y espa\u00f1ol"},"content":{"rendered":"<p>Interesante manual de Backtrack 5 donde se explica el uso de este importantisimo kit de herramientas de seguridad en ellos se explican diferentes temas de como utilizar las herramientas disponibles.<\/p>\n<p>El temario es muy completo tiene las siguientes unidades y de cada una se despende un sin fin de subtemas haciendo un total de casi 300 paginas de informacion.<\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li>Conceptos b\u00e1sicos sobre BackTrack<\/li>\n<li>Recopilaci\u00f3n de informaci\u00f3n<\/li>\n<li>Reuni\u00f3n Abierta de Servicios de Informaci\u00f3n<\/li>\n<li>Port Scanning<\/li>\n<li>ARP Spoofing<\/li>\n<li>Buffer Overflow Explotaci\u00f3n<\/li>\n<li>Trabajo con Exploits<\/li>\n<li>Transferencia de archivos<\/li>\n<li>Aprovechar los marcos<\/li>\n<li>Client Side Attacks<\/li>\n<li>Port<\/li>\n<li>Ataques Contrase\u00f1a<\/li>\n<li>Web ataque de aplicaci\u00f3n<\/li>\n<li>Caballos de Troya<\/li>\n<li>Windows<\/li>\n<li>Los rootkits<\/li>\n<\/ol>\n<p><a href=\"..\/recursos\/curso-backtrack.pdf\">Descargar Libro<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Interesante manual de Backtrack 5 donde se explica el uso de este importantisimo kit de herramientas de seguridad en ellos se explican diferentes temas de como utilizar las herramientas disponibles.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":420,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,10],"tags":[],"class_list":["post-176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking","category-seguridad"],"_links":{"self":[{"href":"https:\/\/emanuelpaxtian.com\/blog\/wp-json\/wp\/v2\/posts\/176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/emanuelpaxtian.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/emanuelpaxtian.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/emanuelpaxtian.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/emanuelpaxtian.com\/blog\/wp-json\/wp\/v2\/comments?post=176"}],"version-history":[{"count":0,"href":"https:\/\/emanuelpaxtian.com\/blog\/wp-json\/wp\/v2\/posts\/176\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/emanuelpaxtian.com\/blog\/wp-json\/wp\/v2\/media\/420"}],"wp:attachment":[{"href":"https:\/\/emanuelpaxtian.com\/blog\/wp-json\/wp\/v2\/media?parent=176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/emanuelpaxtian.com\/blog\/wp-json\/wp\/v2\/categories?post=176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/emanuelpaxtian.com\/blog\/wp-json\/wp\/v2\/tags?post=176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}