{"id":1362,"date":"2013-03-28T07:08:39","date_gmt":"2013-03-28T12:08:39","guid":{"rendered":"http:\/\/eljeffto.com\/?p=1362"},"modified":"2014-07-08T18:19:50","modified_gmt":"2014-07-08T23:19:50","slug":"charla-sobre-seguridad-en-dispositivos-moviles","status":"publish","type":"post","link":"https:\/\/eljeffto.com\/?p=1362","title":{"rendered":"Charla sobre seguridad en dispositivos m\u00f3viles"},"content":{"rendered":"<p style=\"text-align: justify;\">En esta entrada encontrar\u00e1n la presentaci\u00f3n empleada para la charla \u00abMobile Security\u00bb impartida en el Hacker Garage de Guadalajaraen la reuni\u00f3n mensual en torno a temas de Hacking. Durante la charla abord\u00e9 como realizar pruebas de intrusi\u00f3n a aplicaciones en dispositivos m\u00f3viles siguiendo la gu\u00eda propuesta por OWASP\u00a0 Mobile Security Project. Aqu\u00ed les comparto la\u00a0 <a title=\"Mobile Hacking\" href=\"http:\/\/eljeffto.com\/wp-content\/uploads\/2013\/03\/Mobile-Hacking.pdf\" target=\"_blank\">presentaci\u00f3n<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En esta entrada encontrar\u00e1n la presentaci\u00f3n empleada para la charla \u00abMobile Security\u00bb impartida en el Hacker Garage de Guadalajaraen la reuni\u00f3n mensual en torno a temas de Hacking. Durante la charla abord\u00e9 como realizar pruebas de intrusi\u00f3n a aplicaciones en dispositivos m\u00f3viles siguiendo la gu\u00eda propuesta por OWASP\u00a0 Mobile Security Project. Aqu\u00ed les comparto la\u00a0 &#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/eljeffto.com\/?p=1362\">[Read more&#8230;]<\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":910,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[439,362,28],"tags":[404,519,589,518,522,475,523,384],"class_list":{"0":"entry","1":"post","2":"publish","3":"author-jeffto","4":"post-1362","6":"format-standard","7":"has-post-thumbnail","8":"category-hacking","9":"category-seguridad-de-la-informacion","10":"category-tecnologia","11":"post_tag-android","12":"post_tag-blackberry","13":"post_tag-hacking","14":"post_tag-ios","15":"post_tag-mobile-security","16":"post_tag-owasp","17":"post_tag-pentest","18":"post_tag-windows"},"_links":{"self":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/1362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1362"}],"version-history":[{"count":2,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/1362\/revisions"}],"predecessor-version":[{"id":1610,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/1362\/revisions\/1610"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/media\/910"}],"wp:attachment":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}