<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1684-1859</journal-id>
<journal-title><![CDATA[Revista Cubana de Informática Médica]]></journal-title>
<abbrev-journal-title><![CDATA[RCIM]]></abbrev-journal-title>
<issn>1684-1859</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Ciencias Médicas de La Habana]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1684-18592020000100116</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Herramientas fundamentales para el hacking ético]]></article-title>
<article-title xml:lang="en"><![CDATA[Fundamental Tools for Ethical Hacking]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez Llerena]]></surname>
<given-names><![CDATA[Alain Eduardo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Empresa de Telecomunicaciones de Cuba S.A Dirección Territorial Oeste ]]></institution>
<addr-line><![CDATA[La Habana ]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2020</year>
</pub-date>
<volume>12</volume>
<numero>1</numero>
<fpage>116</fpage>
<lpage>131</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_arttext&amp;pid=S1684-18592020000100116&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_abstract&amp;pid=S1684-18592020000100116&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.sld.cu/scielo.php?script=sci_pdf&amp;pid=S1684-18592020000100116&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN En Cuba la mayoría de los especialistas de seguridad informática tienen un escaso conocimiento sobre las herramientas indispensables del hacking ético. Para realizar la presente investigación se hicieron búsquedas bibliográficas nacionales e internacionales. De la gran cantidad de herramientas disponibles en distribuciones especializadas para la seguridad informática (Parrot Security, Black Arch y Kali Linux), se seleccionaron aquellas que se ajustaban más a las características de las redes cubanas. Este trabajo tuvo como objetivo describir algunas de las herramientas seleccionadas para el escaneo y explotación de vulnerabilidades, y conceptos fundamentales sobre el tema. Consideramos que este estudio puede ser provechoso para los especialistas cubanos en seguridad informática pues les servirá no solo para conocer sobre el hacking ético, sino también cuáles son las herramientas que se pueden emplear, teniendo en cuenta las características de nuestras redes nacionales.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT In Cuba, most computer security specialists have little knowledge about the essential tools of ethical hacking. To carry out the present investigation, national and international bibliographic searches were made. From the large number of tools available in specialized distributions for computer security (Parrot Security, Black Arch and Kali Linux), those that best fit the characteristics of Cuban networks were selected. Our research aimed to describe some of the selected tools for scanning and exploiting vulnerabilities, and fundamental concepts on the subject. We believe that this study will be very useful for Cuban specialists in computer security because it will serve them not only to learn about ethical hacking; but also, what are the tools that can be used taking into account the characteristics of our national networks.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[hacking ético]]></kwd>
<kwd lng="es"><![CDATA[vulnerabilidades]]></kwd>
<kwd lng="es"><![CDATA[escaneo]]></kwd>
<kwd lng="es"><![CDATA[seguridad informática]]></kwd>
<kwd lng="en"><![CDATA[ethical hacking]]></kwd>
<kwd lng="en"><![CDATA[vulnerabilities]]></kwd>
<kwd lng="en"><![CDATA[scanning]]></kwd>
<kwd lng="en"><![CDATA[computer security]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tori]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Hacking Ético]]></source>
<year>2008</year>
<edition>Primera</edition>
<publisher-loc><![CDATA[Rosario Argentina ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guevara Soriano]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hacking ético: mitos y realidades]]></article-title>
<source><![CDATA[Revista .Seguridad]]></source>
<year>2012</year>
<numero>12</numero>
<issue>12</issue>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Así trabajan los hackers éticos que se dedican a piratear legalmente empresas como Uber, Starbucks o Airbnb]]></source>
<year>2020</year>
<publisher-name><![CDATA[Business Insider]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martínez Zamora]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[¿En qué consiste el trabajo de un pentester?]]></source>
<year>2019</year>
<publisher-name><![CDATA[IMF Business School]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ferranti]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[What is Nmap? Why you need this network mapper]]></source>
<year>2018</year>
<publisher-name><![CDATA[Network World]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="">
<collab>Nmap</collab>
<source><![CDATA[The Network Mapper - Free Security Scanner]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mendoza]]></surname>
<given-names><![CDATA[MÁ]]></given-names>
</name>
</person-group>
<source><![CDATA[Cómo utilizar OpenVAS para la evaluación de vulnerabilidades]]></source>
<year>2014</year>
<publisher-name><![CDATA[Welivesecurity]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<collab>OpenVAS</collab>
<source><![CDATA[Open Vulnerability Assessment Scanner]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<source><![CDATA[BetterCAP stable documentation]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Olmento]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Obtener credenciales HTTPS con Bettercap y SSLstrip]]></source>
<year>2017</year>
<publisher-name><![CDATA[Hack Puntes.com]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="">
<source><![CDATA[Metasploit Framework]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bortnik]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pruebas de penetración para principiantes: 5 herramientas para empezar]]></article-title>
<source><![CDATA[Revista .Seguridad]]></source>
<year>2013</year>
<numero>18</numero>
<issue>18</issue>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="">
<collab>Fastan and easy</collab>
<source><![CDATA[Manual about Armitage]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Velasco]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[OWASP ZAP, herramienta para auditar la seguridad de una página web]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blasco Bermejo]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Ataques DoS en aplicaciones Web]]></source>
<year>2007</year>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="">
<collab>Team Ghs Software</collab>
<source><![CDATA[Top sistemas operativos para Ethical Hacking]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Caballero Quezada]]></surname>
<given-names><![CDATA[AE]]></given-names>
</name>
</person-group>
<source><![CDATA[Instalación de Damn Vulnerable Web Application (DVWA)]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Katritzidakis]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Malware Development for Red Teaming Using Metasploit]]></source>
<year>2018</year>
<publisher-name><![CDATA[Thessaloniki - Greece: International Hellenic University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ch]]></surname>
<given-names><![CDATA[Alonso]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bettercap 2: La evolución de la navaja suiza de red y el poder de los Caplets]]></article-title>
<source><![CDATA[Un informático en el lado del mal. Blog personal de Chema Alonso sobre sus cosas]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Un informático en el lado del mal]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cornejo]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Armitage]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="">
<collab>Openvas</collab>
<source><![CDATA[OpenVAS - Open Vulnerability Assessment Scanner]]></source>
<year>2020</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
