Вы находитесь на странице: 1из 6

Índice 7

Índice

Prólogo ........................................................................................................13

Capítulo I
Malware ......................................................................................................15
1. ¿Qué es el malware? ..................................................................................................15
2. Los virus .....................................................................................................................16
¢4XpHVXQYLUXVLQIRUPiWLFR"................................................................................................... 16
¢&yPRIXQFLRQDXQYLUXVLQIRUPiWLFR" ..................................................................................... 17
¢&yPRLGHQWL¿FRXQYLUXVLQIRUPiWLFR".................................................................................... 17
¢&yPRSXHGRSURWHJHUPHGHXQYLUXVLQIRUPiWLFR" ................................................................. 17
3. Gusano ........................................................................................................................18
¢4XpHVXQJXVDQRLQIRUPiWLFR" ............................................................................................... 18
¢&yPRIXQFLRQDXQJXVDQRLQIRUPiWLFR" ................................................................................. 18
¢&yPRLGHQWL¿FRXQJXVDQRLQIRUPiWLFR" ................................................................................ 19
¢&yPRSXHGRSURWHJHUPHGHXQJXVDQRLQIRUPiWLFR".............................................................. 19
4. Troyano .......................................................................................................................20
¢4XpHVXQWUR\DQR" .................................................................................................................. 20
¢&yPRIXQFLRQDXQWUR\DQR" .................................................................................................... 20
¢&yPRLGHQWL¿FRXQWUR\DQR" ................................................................................................... 21
¢&yPRSXHGRSURWHJHUPHGHXQWUR\DQR" ................................................................................ 22
3R&GHWHFWDQGRXQWUR\DQRHQXQDGHVFDUJDLOHJDOGHVRIWZDUH .............................................. 23
5. Ransomware...............................................................................................................25
¢4XpHVXQUDQVRPZDUH"........................................................................................................... 25
¢&yPRIXQFLRQDXQUDQVRPZDUH" ............................................................................................. 26
¢&yPRLGHQWL¿FRXQUDQVRPZDUH" ............................................................................................ 27
¢&yPRSXHGRSURWHJHUPHGHXQUDQVRPZDUH" ......................................................................... 27
6. Spyware ......................................................................................................................27
¢4XpHVXQVS\ZDUH" ................................................................................................................. 27
¢&yPRIXQFLRQDXQVS\ZDUH" ................................................................................................... 28
¢&yPRLGHQWL¿FRXQVS\ZDUH" .................................................................................................. 29
8 Cómo protegerse de los peligros en Internet

¢&yPRSXHGRSURWHJHUPHGHXQVS\ZDUH" ............................................................................... 30
7. Adware ........................................................................................................................31
¢4XpHVXQDGZDUH"................................................................................................................... 31
¢&yPRIXQFLRQDXQDGZDUH" ..................................................................................................... 32
¢&yPRLGHQWL¿FRXQDGZDUH" .................................................................................................... 33
¢&yPRSXHGRSURWHJHUPHGHXQDGZDUH" ................................................................................. 34
8. Keylogger ...................................................................................................................35
¢4XpHVXQNH\ORJJHU" .............................................................................................................. 35
¢&yPRIXQFLRQDXQNH\ORJJHU" ................................................................................................ 36
¢&yPRLGHQWL¿FRXQNH\ORJJHU" ............................................................................................... 36
¢&yPRSXHGRSURWHJHUPHGHXQNH\ORJJHU"............................................................................. 37
PoC: análisis del impacto de un keylogger en un equipo.......................................................... 38
9. Backdoor ....................................................................................................................42
¢4XpHVXQEDFNGRRU" ............................................................................................................... 42
¢&yPRIXQFLRQDXQEDFNGRRU".................................................................................................. 42
¢&yPRLGHQWL¿FRXQEDFNGRRU" ................................................................................................ 42
¢&yPRSXHGRSURWHJHUPHGHXQEDFNGRRU" .............................................................................. 45
3R&FRPSUREDQGRORVHIHFWRVGHXQEDFNGRRU ........................................................................ 45
10. Rootkit ......................................................................................................................47
¢4XpHVXQURRWNLW".................................................................................................................... 47
¢&yPRIXQFLRQDXQURRWNLW" ...................................................................................................... 47
¢&yPRLGHQWL¿FRXQURRWNLW"..................................................................................................... 48
¢&yPRSXHGRSURWHJHUPHGHXQURRWNLW" .................................................................................. 48
11. Rogue software .........................................................................................................48
¢4XpHVXQURJXHVRIWZDUH" ...................................................................................................... 48
¢&yPRIXQFLRQDXQURJXHVRIWZDUH"......................................................................................... 49
¢&yPRLGHQWL¿FRXQURJXHVRIWZDUH" ....................................................................................... 49
¢&yPRSXHGRSURWHJHUPHGHXQURJXHVRIWZDUH" ..................................................................... 51

Capítulo II
Robo de información..................................................................................53
1. La ingeniería social....................................................................................................53
¢4XpHVODLQJHQLHUtDVRFLDO" ..................................................................................................... 53
¢&yPRLGHQWL¿FRXQDWDTXHGHLQJHQLHUtDVRFLDO" ..................................................................... 54
¢&yPRSXHGRSURWHJHUPHGHXQDWDTXHGHLQJHQLHUtDVRFLDO" .................................................. 55
2. El phishing .................................................................................................................55
¢4XpHVHOSKLVKLQJ".................................................................................................................. 55
¢&yPRLGHQWL¿FRXQDWDTXHGHSKLVKLQJ" ................................................................................. 56
¢&yPRSXHGRSURWHJHUPHGHXQDWDTXHGHSKLVKLQJ"............................................................... 56
Índice 9

PoC: analizando un posible caso de phishing ........................................................................... 57


3. El vishing ....................................................................................................................63
¢4XpHVHOYLVKLQJ".................................................................................................................... 63
¢&yPRLGHQWL¿FRXQDWDTXHGHYLVKLQJ" ................................................................................... 64
¢&yPRSXHGRSURWHJHUPHGHXQDWDTXHGHYLVKLQJ"................................................................. 64
4. El pharming ...............................................................................................................65
¢4XpHVHOSKDUPLQJ" ................................................................................................................ 65
¢&yPRLGHQWL¿FRXQDWDTXHGHSKDUPLQJ" ................................................................................ 67
¢&yPRSXHGRSURWHJHUPHGHXQDWDTXHGHSKDUPLQJ" ............................................................. 67

Capítulo III
Scamming....................................................................................................69
1. ¿Qué es el scamming? ...............................................................................................69
2. Principales tipos de scamming en Internet .............................................................69
/DHVWDIDQLJHULDQD .................................................................................................................... 70
/DRIHUWDGHOVLJOR...................................................................................................................... 71
La venta ilegal de cuentas ......................................................................................................... 72
/DHVWDIDGHOD21* .................................................................................................................. 73
/DRIHUWDGHHPSOHR................................................................................................................... 73
(OWLPRGHOGLQHURIiFLO.............................................................................................................. 75
Los cheques regalo .................................................................................................................... 76
/DHVWDIDGHODVFULSWRPRQHGDV ................................................................................................. 78
/DHVWDIDGH&XSLGR................................................................................................................... 79
El timo cinco estrellas ............................................................................................................... 81
El timo de la multa .................................................................................................................... 83
/DIDOVDDSOLFDFLyQ..................................................................................................................... 85
3. ¿Cómo puedo protegerme del scamming? ..............................................................89

Capítulo IV
Bulos y engaños ..........................................................................................91
1. Los bulos.....................................................................................................................91
¢4XpHVXQEXOR" ....................................................................................................................... 91
¢4XpWLSRVGHEXORH[LVWHQ"....................................................................................................... 92
Bulos cómicos ........................................................................................................................... 92
%XORVGHFRQIXVLyQ .................................................................................................................... 93
Bulos de ignorancia ................................................................................................................... 94
Bulos de salud ........................................................................................................................... 95
%XORVGHPXHUWHVGHIDPRVRV .................................................................................................... 95
Bulos de ideología ..................................................................................................................... 96
10 Cómo protegerse de los peligros en Internet

Bulos de reputación ................................................................................................................... 96


¢&yPRSXHGRSURWHJHUPHGHORVEXORV" ................................................................................... 97
2. Los mensajes en cadena ............................................................................................98
¢4XpHVXQPHQVDMHHQFDGHQD" ................................................................................................ 98
¢&yPRLGHQWL¿FRXQPHQVDMHHQFDGHQD" ................................................................................. 98
¢&yPRSXHGRSURWHJHUPHGHORVPHQVDMHVHQFDGHQD" ............................................................ 99
3. Los desafíos ................................................................................................................99
¢'yQGHHVWiHOSHOLJURGHORVGHVDItRV"................................................................................... 101
¢3RUTXpVHKDFHQORVGHVDItRV" .............................................................................................. 102
¢&yPRPHSURWHMRGHORVGHVDItRV"......................................................................................... 102
4. El grooming ..............................................................................................................103
¢4XpHVHOJURRPLQJ" .............................................................................................................. 103
¢&yPRLGHQWL¿FRHOJURRPLQJ" ............................................................................................... 104
¢&yPRLGHQWL¿FRDXQDYtFWLPDGHJURRPLQJ" ....................................................................... 105
¢4XpKDFHUVLGHWHFWRXQFDVRGHJURRPLQJ" .......................................................................... 106
¢&yPRSXHGRSURWHJHUPHGHOJURRPLQJ" ............................................................................... 107

Capítulo V
La Deep Web ............................................................................................109
1. Las capas de Internet ..............................................................................................109
2. La red Tor................................................................................................................. 110
¢3DUDTXpVLUYHODUHG7RU" ...................................................................................................... 110
3R&GHVFXEULHQGRLQIRUPDFLyQGHXQDUHGFRQ0,70...........................................................111
¢&yPRIXQFLRQDODUHG7RU" .................................................................................................... 114
3. Conectando a la Dark Web ..................................................................................... 116
3R&DFFHGLHQGRDOD6XUIDFH:HEGHVGH7RU%URZVHU............................................................ 116
4. Contenido de la Dark Web ..................................................................................... 119
Buscadores y directorios ......................................................................................................... 120
Correo electrónico ................................................................................................................... 121
%ORJVIRURV\FKDWV ................................................................................................................. 121
Repositorios............................................................................................................................. 123
Tiendas y servicios .................................................................................................................. 126
5. Riesgos en la red Tor ...............................................................................................130

Capítulo VI
Privacidad e identidad digital .................................................................133
1. La identidad digital .................................................................................................133
El uso de los datos ................................................................................................................... 134
Índice 11

3R&¢TXpGDWRVWLHQH*RRJOHGHPt" ..................................................................................... 136


3R&HOHIHFWRGHODVFRRNLHVHQORVSUHFLRVGHSURGXFWRV\VHUYLFLRV .................................... 141
Lo que otros publican sobre mi ............................................................................................... 144
La netiqueta ............................................................................................................................. 146
2. Protección de dispositivos .......................................................................................148
3URWHFFLyQItVLFD ...................................................................................................................... 149
Elementos biométricos ............................................................................................................ 151
Las contraseñas ....................................................................................................................... 153
3. Protección de cuentas ..............................................................................................157
PoC: gestión del acceso a cuentas con Latch .......................................................................... 158
4. Protección de la navegación....................................................................................162
5. Protección de la IP durante la navegación ............................................................166
PoC: conexión a un sitio web vía proxy.................................................................................. 167
Saneamiento de las extensiones y los plugins ......................................................................... 169
6. Protección de los datos durante la navegación .....................................................171
PoC: eliminar los datos de navegación ................................................................................... 171
7. Protección de datos ..................................................................................................174
&RQ¿JXUDFLyQGHODSULYDFLGDG ..............................................................................184
Twitter ..................................................................................................................................... 184
Facebook ................................................................................................................................. 185
YouTube .................................................................................................................................. 186
Instagram ................................................................................................................................. 188
Musical.ly ................................................................................................................................ 188
LinkedIn .................................................................................................................................. 189

Capítulo VII
Sexting, sextorsión y ciberbullying .........................................................191
1. El sexting ..................................................................................................................191
¢4XpHVHOVH[WLQJ" .................................................................................................................. 191
¢3RUTXpVHKDFHVH[WLQJ"........................................................................................................ 192
¢4XpVHXWLOL]DSDUDJHQHUDUVH[WLQJ" ...................................................................................... 193
¢4XpSHOLJURVWLHQHHOVH[WLQJ" ............................................................................................... 194
¢&yPRSXHGRSURWHJHUPHGHORVSHOLJURVGHOVH[WLQJ"........................................................... 194
PoC: eliminar metadatos del contenido que sexteamos .......................................................... 195
¢&yPRDFWXDUDQWHXQFDVRGHVH[WLQJ"................................................................................... 198
2. La sextorsión ............................................................................................................198
¢4XpHVODVH[WRUVLyQ" ............................................................................................................. 198
¢4XpFRQVHFXHQFLDVWLHQHODVH[WRUVLyQ"................................................................................. 199
¢&yPRSXHGRSURWHJHUPHGHODVH[WRUVLyQ" ........................................................................... 199
12 Cómo protegerse de los peligros en Internet

3. El ciberbullying .......................................................................................................199
¢4XpHVHOFLEHUEXOO\LQJ" ........................................................................................................ 199
Roles en un caso de ciberbullying........................................................................................... 200
Sinopsis de un caso de ciberbullying ...................................................................................... 201
¢&yPRSRGHPRVGHWHFWDUXQFDVRGHFLEHUEXOO\LQJ" .............................................................. 202
¢&yPRSXHGRSURWHJHUPHGHOFLEHUEXOO\LQJ" ......................................................................... 203
¢4XpKDJRVLVXIURFLEHUEXOO\LQJ"........................................................................................... 204

Capítulo VIII
El control parental ...................................................................................205
1. Introducción .............................................................................................................205
La edad ideal para tener su propio dispositivo ........................................................................ 207
/DFODVL¿FDFLyQGHORVFRQWHQLGRV ...........................................................................209
(OVLVWHPD3(*, ...................................................................................................................... 209
El sistema ESRB ..................................................................................................................... 210
(OVLVWHPD&(52..................................................................................................................... 211
Compras y anuncios integrados en las apps ............................................................................ 212
3. El control parental...................................................................................................213
¢4XpHVHOFRQWUROSDUHQWDO" .................................................................................................... 213
Herramientas nativas de control parental ................................................................................ 216
Aplicaciones de control parental ............................................................................................. 219
3R&FRQ¿JXUDFLyQ\XVRGHOFRQWUROSDUHQWDO ........................................................................ 220

Índice de imágenes ...................................................................................231

Otros títulos de la colección ....................................................................237

Оценить