{"id":966,"date":"2010-12-04T20:06:36","date_gmt":"2010-12-05T01:06:36","guid":{"rendered":"http:\/\/eljeffto.com\/?p=966"},"modified":"2014-07-08T18:19:42","modified_gmt":"2014-07-08T23:19:42","slug":"entornos-de-hacking-y-pentesting-de-bolsillo","status":"publish","type":"post","link":"https:\/\/eljeffto.com\/?p=966","title":{"rendered":"Entornos de Hacking y Pentesting de Bolsillo"},"content":{"rendered":"<p>Bueno, les comparto la charla del Barcamp dedicado a seguridad inform\u00e1tica.<\/p>\n<p>Espero les sea de inter\u00e9s.<\/p>\n<div style=\"width: 425px;\"><object id=\"__sse6033322\" classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" width=\"425\" height=\"355\" codebase=\"http:\/\/download.macromedia.com\/pub\/shockwave\/cabs\/flash\/swflash.cab#version=6,0,40,0\"><param name=\"allowFullScreen\" value=\"true\" \/><param name=\"allowScriptAccess\" value=\"always\" \/><param name=\"src\" value=\"http:\/\/static.slidesharecdn.com\/swf\/ssplayer2.swf?doc=presentacionbarcamp-101204185757-phpapp02&amp;stripped_title=presentacion-barcamp&amp;userName=eljeffto\" \/><param name=\"name\" value=\"__sse6033322\" \/><param name=\"allowfullscreen\" value=\"true\" \/><embed id=\"__sse6033322\" type=\"application\/x-shockwave-flash\" width=\"425\" height=\"355\" src=\"http:\/\/static.slidesharecdn.com\/swf\/ssplayer2.swf?doc=presentacionbarcamp-101204185757-phpapp02&amp;stripped_title=presentacion-barcamp&amp;userName=eljeffto\" name=\"__sse6033322\" allowscriptaccess=\"always\" allowfullscreen=\"true\"><\/embed><\/object><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Bueno, les comparto la charla del Barcamp dedicado a seguridad inform\u00e1tica. Espero les sea de inter\u00e9s.<\/p>\n","protected":false},"author":2,"featured_media":915,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[439,13,15,25,362,27,192,28],"tags":[459,589,577,443,458,182,384],"class_list":{"0":"entry","1":"post","2":"publish","3":"author-jeffto","4":"post-966","6":"format-standard","7":"has-post-thumbnail","8":"category-hacking","9":"category-internet","10":"category-linux","11":"category-reporte-seguridad-p","12":"category-seguridad-de-la-informacion","13":"category-softwarelibre","14":"category-sysadmin","15":"category-tecnologia","16":"post_tag-etica","17":"post_tag-hacking","18":"post_tag-linux","19":"post_tag-pentesting","20":"post_tag-sandbox","21":"post_tag-seguridad","22":"post_tag-windows"},"_links":{"self":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=966"}],"version-history":[{"count":5,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/966\/revisions"}],"predecessor-version":[{"id":1586,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/966\/revisions\/1586"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/media\/915"}],"wp:attachment":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}