Índice
Prólogo ........................................................................................................13
Capítulo I
Malware ......................................................................................................15
1. ¿Qué es el malware? ..................................................................................................15
2. Los virus .....................................................................................................................16
¢4XpHVXQYLUXVLQIRUPiWLFR"................................................................................................... 16
¢&yPRIXQFLRQDXQYLUXVLQIRUPiWLFR" ..................................................................................... 17
¢&yPRLGHQWL¿FRXQYLUXVLQIRUPiWLFR".................................................................................... 17
¢&yPRSXHGRSURWHJHUPHGHXQYLUXVLQIRUPiWLFR" ................................................................. 17
3. Gusano ........................................................................................................................18
¢4XpHVXQJXVDQRLQIRUPiWLFR" ............................................................................................... 18
¢&yPRIXQFLRQDXQJXVDQRLQIRUPiWLFR" ................................................................................. 18
¢&yPRLGHQWL¿FRXQJXVDQRLQIRUPiWLFR" ................................................................................ 19
¢&yPRSXHGRSURWHJHUPHGHXQJXVDQRLQIRUPiWLFR".............................................................. 19
4. Troyano .......................................................................................................................20
¢4XpHVXQWUR\DQR" .................................................................................................................. 20
¢&yPRIXQFLRQDXQWUR\DQR" .................................................................................................... 20
¢&yPRLGHQWL¿FRXQWUR\DQR" ................................................................................................... 21
¢&yPRSXHGRSURWHJHUPHGHXQWUR\DQR" ................................................................................ 22
3R&GHWHFWDQGRXQWUR\DQRHQXQDGHVFDUJDLOHJDOGHVRIWZDUH .............................................. 23
5. Ransomware...............................................................................................................25
¢4XpHVXQUDQVRPZDUH"........................................................................................................... 25
¢&yPRIXQFLRQDXQUDQVRPZDUH" ............................................................................................. 26
¢&yPRLGHQWL¿FRXQUDQVRPZDUH" ............................................................................................ 27
¢&yPRSXHGRSURWHJHUPHGHXQUDQVRPZDUH" ......................................................................... 27
6. Spyware ......................................................................................................................27
¢4XpHVXQVS\ZDUH" ................................................................................................................. 27
¢&yPRIXQFLRQDXQVS\ZDUH" ................................................................................................... 28
¢&yPRLGHQWL¿FRXQVS\ZDUH" .................................................................................................. 29
8 Cómo protegerse de los peligros en Internet
¢&yPRSXHGRSURWHJHUPHGHXQVS\ZDUH" ............................................................................... 30
7. Adware ........................................................................................................................31
¢4XpHVXQDGZDUH"................................................................................................................... 31
¢&yPRIXQFLRQDXQDGZDUH" ..................................................................................................... 32
¢&yPRLGHQWL¿FRXQDGZDUH" .................................................................................................... 33
¢&yPRSXHGRSURWHJHUPHGHXQDGZDUH" ................................................................................. 34
8. Keylogger ...................................................................................................................35
¢4XpHVXQNH\ORJJHU" .............................................................................................................. 35
¢&yPRIXQFLRQDXQNH\ORJJHU" ................................................................................................ 36
¢&yPRLGHQWL¿FRXQNH\ORJJHU" ............................................................................................... 36
¢&yPRSXHGRSURWHJHUPHGHXQNH\ORJJHU"............................................................................. 37
PoC: análisis del impacto de un keylogger en un equipo.......................................................... 38
9. Backdoor ....................................................................................................................42
¢4XpHVXQEDFNGRRU" ............................................................................................................... 42
¢&yPRIXQFLRQDXQEDFNGRRU".................................................................................................. 42
¢&yPRLGHQWL¿FRXQEDFNGRRU" ................................................................................................ 42
¢&yPRSXHGRSURWHJHUPHGHXQEDFNGRRU" .............................................................................. 45
3R&FRPSUREDQGRORVHIHFWRVGHXQEDFNGRRU ........................................................................ 45
10. Rootkit ......................................................................................................................47
¢4XpHVXQURRWNLW".................................................................................................................... 47
¢&yPRIXQFLRQDXQURRWNLW" ...................................................................................................... 47
¢&yPRLGHQWL¿FRXQURRWNLW"..................................................................................................... 48
¢&yPRSXHGRSURWHJHUPHGHXQURRWNLW" .................................................................................. 48
11. Rogue software .........................................................................................................48
¢4XpHVXQURJXHVRIWZDUH" ...................................................................................................... 48
¢&yPRIXQFLRQDXQURJXHVRIWZDUH"......................................................................................... 49
¢&yPRLGHQWL¿FRXQURJXHVRIWZDUH" ....................................................................................... 49
¢&yPRSXHGRSURWHJHUPHGHXQURJXHVRIWZDUH" ..................................................................... 51
Capítulo II
Robo de información..................................................................................53
1. La ingeniería social....................................................................................................53
¢4XpHVODLQJHQLHUtDVRFLDO" ..................................................................................................... 53
¢&yPRLGHQWL¿FRXQDWDTXHGHLQJHQLHUtDVRFLDO" ..................................................................... 54
¢&yPRSXHGRSURWHJHUPHGHXQDWDTXHGHLQJHQLHUtDVRFLDO" .................................................. 55
2. El phishing .................................................................................................................55
¢4XpHVHOSKLVKLQJ".................................................................................................................. 55
¢&yPRLGHQWL¿FRXQDWDTXHGHSKLVKLQJ" ................................................................................. 56
¢&yPRSXHGRSURWHJHUPHGHXQDWDTXHGHSKLVKLQJ"............................................................... 56
Índice 9
Capítulo III
Scamming....................................................................................................69
1. ¿Qué es el scamming? ...............................................................................................69
2. Principales tipos de scamming en Internet .............................................................69
/DHVWDIDQLJHULDQD .................................................................................................................... 70
/DRIHUWDGHOVLJOR...................................................................................................................... 71
La venta ilegal de cuentas ......................................................................................................... 72
/DHVWDIDGHOD21* .................................................................................................................. 73
/DRIHUWDGHHPSOHR................................................................................................................... 73
(OWLPRGHOGLQHURIiFLO.............................................................................................................. 75
Los cheques regalo .................................................................................................................... 76
/DHVWDIDGHODVFULSWRPRQHGDV ................................................................................................. 78
/DHVWDIDGH&XSLGR................................................................................................................... 79
El timo cinco estrellas ............................................................................................................... 81
El timo de la multa .................................................................................................................... 83
/DIDOVDDSOLFDFLyQ..................................................................................................................... 85
3. ¿Cómo puedo protegerme del scamming? ..............................................................89
Capítulo IV
Bulos y engaños ..........................................................................................91
1. Los bulos.....................................................................................................................91
¢4XpHVXQEXOR" ....................................................................................................................... 91
¢4XpWLSRVGHEXORH[LVWHQ"....................................................................................................... 92
Bulos cómicos ........................................................................................................................... 92
%XORVGHFRQIXVLyQ .................................................................................................................... 93
Bulos de ignorancia ................................................................................................................... 94
Bulos de salud ........................................................................................................................... 95
%XORVGHPXHUWHVGHIDPRVRV .................................................................................................... 95
Bulos de ideología ..................................................................................................................... 96
10 Cómo protegerse de los peligros en Internet
Capítulo V
La Deep Web ............................................................................................109
1. Las capas de Internet ..............................................................................................109
2. La red Tor................................................................................................................. 110
¢3DUDTXpVLUYHODUHG7RU" ...................................................................................................... 110
3R&GHVFXEULHQGRLQIRUPDFLyQGHXQDUHGFRQ0,70...........................................................111
¢&yPRIXQFLRQDODUHG7RU" .................................................................................................... 114
3. Conectando a la Dark Web ..................................................................................... 116
3R&DFFHGLHQGRDOD6XUIDFH:HEGHVGH7RU%URZVHU............................................................ 116
4. Contenido de la Dark Web ..................................................................................... 119
Buscadores y directorios ......................................................................................................... 120
Correo electrónico ................................................................................................................... 121
%ORJVIRURV\FKDWV ................................................................................................................. 121
Repositorios............................................................................................................................. 123
Tiendas y servicios .................................................................................................................. 126
5. Riesgos en la red Tor ...............................................................................................130
Capítulo VI
Privacidad e identidad digital .................................................................133
1. La identidad digital .................................................................................................133
El uso de los datos ................................................................................................................... 134
Índice 11
Capítulo VII
Sexting, sextorsión y ciberbullying .........................................................191
1. El sexting ..................................................................................................................191
¢4XpHVHOVH[WLQJ" .................................................................................................................. 191
¢3RUTXpVHKDFHVH[WLQJ"........................................................................................................ 192
¢4XpVHXWLOL]DSDUDJHQHUDUVH[WLQJ" ...................................................................................... 193
¢4XpSHOLJURVWLHQHHOVH[WLQJ" ............................................................................................... 194
¢&yPRSXHGRSURWHJHUPHGHORVSHOLJURVGHOVH[WLQJ"........................................................... 194
PoC: eliminar metadatos del contenido que sexteamos .......................................................... 195
¢&yPRDFWXDUDQWHXQFDVRGHVH[WLQJ"................................................................................... 198
2. La sextorsión ............................................................................................................198
¢4XpHVODVH[WRUVLyQ" ............................................................................................................. 198
¢4XpFRQVHFXHQFLDVWLHQHODVH[WRUVLyQ"................................................................................. 199
¢&yPRSXHGRSURWHJHUPHGHODVH[WRUVLyQ" ........................................................................... 199
12 Cómo protegerse de los peligros en Internet
3. El ciberbullying .......................................................................................................199
¢4XpHVHOFLEHUEXOO\LQJ" ........................................................................................................ 199
Roles en un caso de ciberbullying........................................................................................... 200
Sinopsis de un caso de ciberbullying ...................................................................................... 201
¢&yPRSRGHPRVGHWHFWDUXQFDVRGHFLEHUEXOO\LQJ" .............................................................. 202
¢&yPRSXHGRSURWHJHUPHGHOFLEHUEXOO\LQJ" ......................................................................... 203
¢4XpKDJRVLVXIURFLEHUEXOO\LQJ"........................................................................................... 204
Capítulo VIII
El control parental ...................................................................................205
1. Introducción .............................................................................................................205
La edad ideal para tener su propio dispositivo ........................................................................ 207
/DFODVL¿FDFLyQGHORVFRQWHQLGRV ...........................................................................209
(OVLVWHPD3(*, ...................................................................................................................... 209
El sistema ESRB ..................................................................................................................... 210
(OVLVWHPD&(52..................................................................................................................... 211
Compras y anuncios integrados en las apps ............................................................................ 212
3. El control parental...................................................................................................213
¢4XpHVHOFRQWUROSDUHQWDO" .................................................................................................... 213
Herramientas nativas de control parental ................................................................................ 216
Aplicaciones de control parental ............................................................................................. 219
3R&FRQ¿JXUDFLyQ\XVRGHOFRQWUROSDUHQWDO ........................................................................ 220