{"id":30081,"date":"2024-10-10T13:16:35","date_gmt":"2024-10-10T11:16:35","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/?p=30081"},"modified":"2024-10-10T13:47:46","modified_gmt":"2024-10-10T11:47:46","slug":"man-in-the-middle","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/","title":{"rendered":"Ataques inform\u00e1ticos y c\u00f3mo defenderse: Man In The Middle"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-principios-generales-del-ataque-mitm\"><strong>Principios generales del ataque MITM<\/strong><\/h2>\n\n\n\n<p>Muchos ataques inform\u00e1ticos tienen como objetivo el robo o la manipulaci\u00f3n de datos. Sin embargo, a menudo puede resultar complicado robar datos de un servidor web, ya que este \u00faltimo cuenta con diversos sistemas de protecci\u00f3n.<\/p>\n\n\n\n<p>Para superar este &#8220;inconveniente&#8221;, los ciberdelincuentes suelen intentar interceptar los datos en el momento en que est\u00e1n m\u00e1s expuestos, es decir, durante su &#8220;viaje a trav\u00e9s de la red&#8221; antes de que lleguen al servidor.<\/p>\n\n\n\n<p><strong>Consideremos lo que sucede a nivel inform\u00e1tico durante una operaci\u00f3n com\u00fan de inicio de sesi\u00f3n:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>El usuario introduce sus datos (nombre de usuario y contrase\u00f1a) en la p\u00e1gina web.<\/li>\n\n\n\n<li>Al presionar el bot\u00f3n de LOGIN, el usuario realiza una solicitud HTTP al servidor que aloja el sitio web y solicita acceso enviando sus credenciales en la solicitud.<\/li>\n\n\n\n<li>El usuario es autenticado si las credenciales enviadas son correctas.<\/li>\n<\/ol>\n\n\n\n<p>Desde el punto 2, es evidente que, en el momento en que el usuario env\u00eda sus credenciales en la solicitud HTTP, estas est\u00e1n m\u00e1s expuestas durante su tr\u00e1nsito por la red.<\/p>\n\n\n\n<p>Es precisamente en este breve lapso de tiempo cuando un posible atacante, accediendo a la red, puede <strong>interceptar los datos del usuario y llevar a cabo el robo.<\/strong> Esta situaci\u00f3n ilustra el origen del nombre del ataque inform\u00e1tico: <strong>Man In The Middle (MITM)<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">La diferencia entre HTTP y HTTPS<\/h3>\n\n\n\n<p>Una primera forma de protecci\u00f3n contra los ataques MITM es la comunicaci\u00f3n a trav\u00e9s del protocolo <strong>HTTPS<\/strong>, donde la &#8220;S&#8221; al final del acr\u00f3nimo es muy importante. La letra &#8220;S&#8221; significa &#8220;secure&#8221; (seguro) e indica que un sitio web utiliza la versi\u00f3n segura del protocolo HTTP, reduciendo as\u00ed el riesgo de exposici\u00f3n de los datos.<\/p>\n\n\n\n<p>Si en el protocolo HTTP los datos entre el emisor y el receptor se transmiten &#8220;en claro&#8221;, con el uso del protocolo HTTPS<strong> los datos se cifran antes de ser transmitidos y<\/strong>, adem\u00e1s, se verifica la confiabilidad del emisor y receptor mediante certificados adecuados.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"440\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/10\/image.png\" alt=\"\" class=\"wp-image-30082\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/10\/image.png 1024w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/10\/image-300x129.png 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/10\/image-768x330.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Para entender mejor c\u00f3mo los atacantes pueden evadir la seguridad de HTTPS, es necesario comprender a grandes rasgos el funcionamiento de los certificados mencionados anteriormente.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Certificados y confiabilidad de los sitios<\/h3>\n\n\n\n<p>Comencemos con las siguientes consideraciones:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cada sitio web confiable posee un certificado que es emitido por una <strong>Autoridad de Certificaci\u00f3n (CA)<\/strong> independiente.<\/li>\n\n\n\n<li>Cada usuario que desea comunicarse con un sitio web espec\u00edfico, antes de establecer una sesi\u00f3n de comunicaci\u00f3n, solicita el certificado del sitio para verificar su confiabilidad.<\/li>\n\n\n\n<li>La solicitud y recepci\u00f3n del certificado permiten establecer una comunicaci\u00f3n cifrada (y por lo tanto segura) entre el usuario (cliente) y el sitio web (servidor).<\/li>\n<\/ul>\n\n\n\n<p>Aquellos que deseen profundizar en el mecanismo de los certificados pueden hacerlo en el <a href=\"https:\/\/aws.amazon.com\/it\/compare\/the-difference-between-https-and-http\/#seo-faq-pairs#how-does-https-protocol-work\">siguiente enlace.<\/a><\/p>\n\n\n\n<p>Los atacantes que desean llevar a cabo ataques MITM intentan eludir el sistema de seguridad de los certificados para acceder a los datos no cifrados, ya que intentar descifrar los datos sin poseer la clave de descifrado ser\u00eda demasiado costoso en t\u00e9rminos de tiempo y recursos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Evasi\u00f3n de la seguridad y estrategias de defensa<\/h3>\n\n\n\n<p>Existen varias t\u00e9cnicas para eludir la seguridad de una red. A continuaci\u00f3n, se describen algunas.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">T\u00e9cnica 1 \u2013 <strong>IP spoofing<\/strong><\/h4>\n\n\n\n<p>En la web, cada dispositivo es identificado por una especie de &#8220;matr\u00edcula&#8221; llamada direcci\u00f3n IP del tipo xxx.xxx.xxx.xxx, donde cada tripleta xxx toma valores entre 0 y 255. Sin embargo, la direcci\u00f3n IP asociada a un dispositivo generalmente se asigna de manera aleatoria y puede ser modificada.<\/p>\n\n\n\n<p>El autor del ataque inform\u00e1tico se hace pasar por un sistema confiable falsificando la direcci\u00f3n IP de sus paquetes de datos enviados a la red y reemplaz\u00e1ndola por la de un sitio confiable.<\/p>\n\n\n\n<p>Una vez que ha ingresado a la red y al sistema, el atacante es clasificado como una entidad &#8220;confiable&#8221; y es libre de realizar diversas acciones maliciosas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"362\" src=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/10\/image-1.png\" alt=\"\" class=\"wp-image-30083\" srcset=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/10\/image-1.png 1024w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/10\/image-1-300x106.png 300w, https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/10\/image-1-768x272.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><br><\/p>\n\n\n\n<p>Una soluci\u00f3n para limitar los intentos de <strong>IP spoofing<\/strong> consiste en filtrar todos los paquetes de datos entrantes y salientes del dispositivo. En particular:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>El filtrado de entrada verifica que la IP de origen de los paquetes est\u00e9 asociada a una fuente verificada.<\/li>\n\n\n\n<li>El filtrado de salida verifica las direcciones IP a las que los paquetes est\u00e1n dirigidos y compara su correspondencia con las direcciones de entrada.<\/li>\n<\/ul>\n\n\n\n<p>Generalmente, las actividades de filtrado de paquetes son tareas confiadas al <strong>firewall<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Profundizaci\u00f3n<\/h3>\n\n\n\n<p>El <strong>IP spoofing<\/strong> tambi\u00e9n se utiliza en ataques <strong>DDoS<\/strong> para enmascarar la IP de la botnet, permitiendo que cada dispositivo de la botnet asuma una direcci\u00f3n IP diferente.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">T\u00e9cnica 2 \u2013 <strong>Replay<\/strong><\/h3>\n\n\n\n<p>El ataque de tipo <strong>replay<\/strong> ocurre cuando un atacante intercepta una comunicaci\u00f3n proveniente de un dispositivo de la red, la bloquea y luego intenta reenviarla posteriormente, haci\u00e9ndose pasar por el remitente.<\/p>\n\n\n\n<p>Para limitar este tipo de ataque, es posible utilizar <strong>marcas de tiempo de sesi\u00f3n<\/strong> (timestamp) que detectan de inmediato si se producen retrasos de comunicaci\u00f3n potencialmente peligrosos.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ataques MITM a gran escala<\/h2>\n\n\n\n<p>Para demostrar cu\u00e1n extendidos y peligrosos pueden ser los ataques MITM, basta con referirse a un <a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/international-operation-dismantles-criminal-group-of-cyber-fraudsters\">informe de Europol de 2015<\/a> que describe el desmantelamiento de una red de delincuentes. Los criminales utilizaban ataques MITM para obtener acceso a las credenciales de cuentas de correo electr\u00f3nico de diversas empresas. Una vez obtenida dicha informaci\u00f3n, los criminales pod\u00edan generar solicitudes de pago dentro del sistema empresarial y desviar grandes sumas a cuentas no rastreables.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Principios generales del ataque MITM Muchos ataques inform\u00e1ticos tienen como objetivo el robo o la manipulaci\u00f3n de datos. Sin embargo, a menudo puede resultar complicado robar datos de un servidor web, ya que este \u00faltimo cuenta con diversos sistemas de protecci\u00f3n. Para superar este &#8220;inconveniente&#8221;, los ciberdelincuentes suelen intentar interceptar los datos en el momento&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/\">Read more<\/a><\/p>\n","protected":false},"author":264,"featured_media":30007,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[10614],"tags":[10711],"collections":[],"class_list":{"0":"post-30081","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ciberseguridad","8":"tag-ciberseguridad","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ataques inform\u00e1ticos y c\u00f3mo defenderse: Man In The Middle - Codemotion Magazine<\/title>\n<meta name=\"description\" content=\"El ataque Man in the Middle busca robar datos en el momento en que estos est\u00e1n m\u00e1s expuestos al riesgo de robo, es decir, durante su tr\u00e1nsito a trav\u00e9s de la red.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ataques inform\u00e1ticos y c\u00f3mo defenderse: Man In The Middle\" \/>\n<meta property=\"og:description\" content=\"El ataque Man in the Middle busca robar datos en el momento en que estos est\u00e1n m\u00e1s expuestos al riesgo de robo, es decir, durante su tr\u00e1nsito a trav\u00e9s de la red.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-10T11:16:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-10T11:47:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fabrizio Tedeschi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fabrizio Tedeschi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/\"},\"author\":{\"name\":\"Fabrizio Tedeschi\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/902dc65e0de8be950fb33d9af4fae7f3\"},\"headline\":\"Ataques inform\u00e1ticos y c\u00f3mo defenderse: Man In The Middle\",\"datePublished\":\"2024-10-10T11:16:35+00:00\",\"dateModified\":\"2024-10-10T11:47:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/\"},\"wordCount\":936,\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg\",\"keywords\":[\"Ciberseguridad\"],\"articleSection\":[\"Ciberseguridad\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/\",\"name\":\"Ataques inform\u00e1ticos y c\u00f3mo defenderse: Man In The Middle - Codemotion Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg\",\"datePublished\":\"2024-10-10T11:16:35+00:00\",\"dateModified\":\"2024-10-10T11:47:46+00:00\",\"description\":\"El ataque Man in the Middle busca robar datos en el momento en que estos est\u00e1n m\u00e1s expuestos al riesgo de robo, es decir, durante su tr\u00e1nsito a trav\u00e9s de la red.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#primaryimage\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg\",\"width\":1792,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberseguridad\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ataques inform\u00e1ticos y c\u00f3mo defenderse: Man In The Middle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Codemotion.Italy\/\",\"https:\/\/x.com\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/902dc65e0de8be950fb33d9af4fae7f3\",\"name\":\"Fabrizio Tedeschi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/08\/IMG_9703-min-100x100.jpg\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/08\/IMG_9703-min-100x100.jpg\",\"caption\":\"Fabrizio Tedeschi\"},\"url\":\"https:\/\/www.codemotion.com\/magazine\/author\/fabriziot\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ataques inform\u00e1ticos y c\u00f3mo defenderse: Man In The Middle - Codemotion Magazine","description":"El ataque Man in the Middle busca robar datos en el momento en que estos est\u00e1n m\u00e1s expuestos al riesgo de robo, es decir, durante su tr\u00e1nsito a trav\u00e9s de la red.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/","og_locale":"en_US","og_type":"article","og_title":"Ataques inform\u00e1ticos y c\u00f3mo defenderse: Man In The Middle","og_description":"El ataque Man in the Middle busca robar datos en el momento en que estos est\u00e1n m\u00e1s expuestos al riesgo de robo, es decir, durante su tr\u00e1nsito a trav\u00e9s de la red.","og_url":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2024-10-10T11:16:35+00:00","article_modified_time":"2024-10-10T11:47:46+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg","type":"image\/jpeg"}],"author":"Fabrizio Tedeschi","twitter_card":"summary_large_image","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Fabrizio Tedeschi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/"},"author":{"name":"Fabrizio Tedeschi","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/902dc65e0de8be950fb33d9af4fae7f3"},"headline":"Ataques inform\u00e1ticos y c\u00f3mo defenderse: Man In The Middle","datePublished":"2024-10-10T11:16:35+00:00","dateModified":"2024-10-10T11:47:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/"},"wordCount":936,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg","keywords":["Ciberseguridad"],"articleSection":["Ciberseguridad"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/","url":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/","name":"Ataques inform\u00e1ticos y c\u00f3mo defenderse: Man In The Middle - Codemotion Magazine","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg","datePublished":"2024-10-10T11:16:35+00:00","dateModified":"2024-10-10T11:47:46+00:00","description":"El ataque Man in the Middle busca robar datos en el momento en que estos est\u00e1n m\u00e1s expuestos al riesgo de robo, es decir, durante su tr\u00e1nsito a trav\u00e9s de la red.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg","width":1792,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/man-in-the-middle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Ciberseguridad","item":"https:\/\/www.codemotion.com\/magazine\/es\/ciberseguridad\/"},{"@type":"ListItem","position":3,"name":"Ataques inform\u00e1ticos y c\u00f3mo defenderse: Man In The Middle"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/902dc65e0de8be950fb33d9af4fae7f3","name":"Fabrizio Tedeschi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/08\/IMG_9703-min-100x100.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/08\/IMG_9703-min-100x100.jpg","caption":"Fabrizio Tedeschi"},"url":"https:\/\/www.codemotion.com\/magazine\/author\/fabriziot\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-600x600.jpg","author_info":{"display_name":"Fabrizio Tedeschi","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/fabriziot\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg",1792,1024,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-300x171.jpg",300,171,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-768x439.jpg",768,439,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-1024x585.jpg",1024,585,true],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-1536x878.jpg",1536,878,true],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle.jpg",1792,1024,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-100x100.jpg",100,100,true],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-896x504.jpg",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2024\/09\/Man-in-the-middle-600x600.jpg",600,600,true]},"uagb_author_info":{"display_name":"Fabrizio Tedeschi","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/fabriziot\/"},"uagb_comment_info":0,"uagb_excerpt":"Principios generales del ataque MITM Muchos ataques inform\u00e1ticos tienen como objetivo el robo o la manipulaci\u00f3n de datos. Sin embargo, a menudo puede resultar complicado robar datos de un servidor web, ya que este \u00faltimo cuenta con diversos sistemas de protecci\u00f3n. Para superar este &#8220;inconveniente&#8221;, los ciberdelincuentes suelen intentar interceptar los datos en el momento&#8230;&hellip;","lang":"es","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/30081","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/264"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=30081"}],"version-history":[{"count":2,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/30081\/revisions"}],"predecessor-version":[{"id":30086,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/30081\/revisions\/30086"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/30007"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=30081"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=30081"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=30081"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=30081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}