Sole reliance on AIS data for ship tracking poses risks for compliance as AIS has vulnerabilities. It can be hacked and falsified, is not continuously transmitted, and was not designed for global tracking. An alternative is PurpleTRAC, which screens ships against sanctions lists, tracks using multiple data sources including secure Inmarsat-C, detects events, and archives activities for auditing and compliance.
The document describes a new type of denial-of-service (DoS) attack that can occur in cloud data centers due to their underprovisioned nature. It identifies that by saturating the network bandwidth between hosts in different subnets, an attacker can target specific applications by congesting the uplink connecting the targeted subnet. It then proposes two approaches for an attacker to identify the network topology and determine a suitable bottleneck link to attack. Finally, it shows that through rapidly launching many virtual machines, an attacker can quickly gain access to a sufficient number of hosts connected to the targeted router subnet to launch an effective bandwidth saturation attack.
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts: The Underrated Web-Danger
Testing and Exploiting Backup-File Artifacts with BFAC
BFAC Homepage: https://github.com/mazen160
Blog Post: http://blog.mazinahmed.net/2016/08/backup-file-artifacts.html
The document is a prompt for students to view an image and write a short text adding details or commentary. Several example responses are provided that humorously comment on unusual aspects of the characters' appearances in a lighthearted manner, such as one character wearing a swan as a hat or another wearing a dress.
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)Marco Balduzzi
While input validation vulnerabilities such as XSS and SQL injection have been intensively studied, a new class of injection vulnerabilities called HTTP Parameter Pollution (HPP) has not received as much attention. HPP attacks consist of injecting encoded query string delimiters into other existing parameters. If a web application does not properly sanitize the user input, a malicious user can compromise the logic of the application to perform either client-side or server-side attacks. One consequence of HPP attacks is that the attacker can potentially override existing hard-coded HTTP parameters to modify the behavior of an application, bypass input validation checkpoints, and access and possibly exploit variables that may be out of direct reach.
In the talk we present the first automated system for the detection of HPP vulnerabilities in real web applications. Our approach consists of injecting fuzzed parameters into the web application and a set of tests and heuristics to determine if the pages that are generated contain HPP vulnerabilities. We used this system to conduct a large-scale experiment by testing more than 5,000 popular websites and discovering unknown HPP flaws in many important and well-known sites such as Microsoft, Google, VMWare, Facebook, Symantec, Paypal and others. These sites have been all informed and many of them have acknowledged or fixed the problems. We will explain in details how to efficiently detect HPP bugs and how to prevent this novel class of injection vulnerabilities in future web applications.
The presentation we created at our class is going to be presented at the Musical school on the 14th of December. All city school will participate on this holiday which is devoted to our great writer.
Sole reliance on AIS data for ship tracking poses risks for compliance as AIS has vulnerabilities. It can be hacked and falsified, is not continuously transmitted, and was not designed for global tracking. An alternative is PurpleTRAC, which screens ships against sanctions lists, tracks using multiple data sources including secure Inmarsat-C, detects events, and archives activities for auditing and compliance.
The document describes a new type of denial-of-service (DoS) attack that can occur in cloud data centers due to their underprovisioned nature. It identifies that by saturating the network bandwidth between hosts in different subnets, an attacker can target specific applications by congesting the uplink connecting the targeted subnet. It then proposes two approaches for an attacker to identify the network topology and determine a suitable bottleneck link to attack. Finally, it shows that through rapidly launching many virtual machines, an attacker can quickly gain access to a sufficient number of hosts connected to the targeted router subnet to launch an effective bandwidth saturation attack.
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts: The Underrated Web-Danger
Testing and Exploiting Backup-File Artifacts with BFAC
BFAC Homepage: https://github.com/mazen160
Blog Post: http://blog.mazinahmed.net/2016/08/backup-file-artifacts.html
The document is a prompt for students to view an image and write a short text adding details or commentary. Several example responses are provided that humorously comment on unusual aspects of the characters' appearances in a lighthearted manner, such as one character wearing a swan as a hat or another wearing a dress.
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)Marco Balduzzi
While input validation vulnerabilities such as XSS and SQL injection have been intensively studied, a new class of injection vulnerabilities called HTTP Parameter Pollution (HPP) has not received as much attention. HPP attacks consist of injecting encoded query string delimiters into other existing parameters. If a web application does not properly sanitize the user input, a malicious user can compromise the logic of the application to perform either client-side or server-side attacks. One consequence of HPP attacks is that the attacker can potentially override existing hard-coded HTTP parameters to modify the behavior of an application, bypass input validation checkpoints, and access and possibly exploit variables that may be out of direct reach.
In the talk we present the first automated system for the detection of HPP vulnerabilities in real web applications. Our approach consists of injecting fuzzed parameters into the web application and a set of tests and heuristics to determine if the pages that are generated contain HPP vulnerabilities. We used this system to conduct a large-scale experiment by testing more than 5,000 popular websites and discovering unknown HPP flaws in many important and well-known sites such as Microsoft, Google, VMWare, Facebook, Symantec, Paypal and others. These sites have been all informed and many of them have acknowledged or fixed the problems. We will explain in details how to efficiently detect HPP bugs and how to prevent this novel class of injection vulnerabilities in future web applications.
The presentation we created at our class is going to be presented at the Musical school on the 14th of December. All city school will participate on this holiday which is devoted to our great writer.
Avian flu Type A-H5N1 epidemiological model: Puerto Rico as a case studyMariangeles Rivera
This document outlines research on modeling the potential spread of avian influenza A-H5N1 between two cities in Puerto Rico. The objectives are to determine potential outbreaks using a metapopulation network approach in a SIR model for Cayey and Aibonito. The methodology implements a mobility model coupling differential equations for the human populations. Parameters include infection and recovery rates. Future work involves simulations under different scenarios and expanding the model to include more towns. Acknowledgments recognize the University of Puerto Rico at Cayey and mentor for the opportunity.
1. This document describes how to enable and disable hard disk drive (HDD) passwords on Dell client systems using the Client Configuration Toolkit (CCTK).
2. The steps include checking for HDD availability in the BIOS, using the "hddinfo" and "hddpwd" CCTK commands to view HDD details and set passwords, rebooting the system for changes to take effect, and verifying passwords are set properly in the BIOS and through additional CCTK commands.
3. The process to clear an HDD password uses the "hddpwd=" CCTK command along with the valid password that was previously set.
A customizable Enterprise Asset Management presentation you can use to share your learnings with the rest of your team. For more information, visit http://softworx.co.za
This document discusses security threats in cloud computing. It introduces the concept of a threat model for analyzing security problems by identifying attackers, assets, vulnerabilities and threats. The key components of a threat model are described, including different types of attackers like insiders and outsiders, the assets and goals of attackers, and common threats organized using the STRIDE framework. Building an accurate threat model is important for designing appropriate security defenses for a cloud computing system.
HTTP(S)-Based Clustering for Assisted Cybercrime InvestigationsMarco Balduzzi
This document describes SPuNge, a system for using HTTP(S) clustering to assist with cybercrime investigations into targeted attacks. SPuNge processes network traces to cluster similar malicious URLs and group machines that request those URLs. It identifies potential targeted attacks as groups of 2-5 machines from the same industry or country reaching clusters of similar URLs. The system was tested on one week of data and found multiple examples of potential targeted attacks on organizations in technology and oil/gas industries from Russia and China.
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...Marco Balduzzi
This document summarizes the findings of an automated analysis of over 5,000 Amazon Machine Images (AMIs) on Amazon's Elastic Compute Cloud (EC2) platform. The analysis found that a high percentage of AMIs contained known software vulnerabilities, malware infections, leftover credentials, and recoverable deleted files containing sensitive data. The security risks demonstrate that users must take precautions when obtaining and sharing AMIs to avoid unintentionally enabling attacks or compromising privacy.
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)Marco Balduzzi
AIS, Automatic Identification System, is a promoted standard and implementation for vessels traffic safety and monitoring. With more than 400,000 installations worldwide, AIS is currently a mandatory installation for commercial vessels and a de-facto equipment for leisure crafts. AIS is largely used in ports worldwide -- Rotterdam alone monitors over 700 AIS-enabled vessels each day, serving 32,000 seagoing and 87,000 inland vessels a year.
Back in October 2013, during HITB KUL, we showed that AIS is hardly broken, both at implementation and protocol level, and it suffers from severe vulnerabilities like spoofing and man-in-the-middle. In this talk, we extend our research by sharing with the audience several novel attacks that we recently discovered, for example how to extensively disable AIS communications or attack the software installed at back-end by port authorities. By doing so, we hope to raise the necessary awareness and lead the involved parties into calling for a more robust and secure AIS.
Cloud computing security policy framework for mitigating denial of service at...Venkatesh Prabhu
The document proposes a security management framework to mitigate denial of service attacks on cloud storage systems. The framework uses a cloud controller in a virtual machine to control data access management by blocking illegal data access. It aims to provide high-level security mechanisms to detect malicious access in cloud storage systems and implement a security policy framework. The proposed system was found to economically provide scaling and security against DOS attacks, though it has limitations such as taking time for installation and the virtual machine failure causing system shutdown.
All content not indexed by traditional web-based search engines is known as the DeepWeb. Wrongly been associated only with the Onion Routing (TOR), the DeepWeb's ecosystem comprises a number of other anonymous and decentralized networks. The Invisible Internet Project (I2P), FreeNET, and Alternative Domain Names (like Name.Space and OpenNic) are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems (e.g., for cryptolockers).
We designed and implemented a prototype system called DeWA for the automated collection and analysis of the DeepWeb, with the goal of quickly identifying new threats as soon they appear.
In this talk, we provide concrete examples of how using DeWA to detect, e.g., trading of illicit and counterfeit goods, underground forums, privacy leaks, hidden dropzones, malware hosting and TOR-based botnets.
This document discusses the configuration of electrical substations and distribution feeders. It mentions substations, distribution feeders, load points, sectionalizer switches, tie switches, and load joints connecting to other feeders. A new configuration is proposed.
The document introduces several characters including Ruslan and his dog Bibo, a baby with a toy, a sheriff with a big cap, a teacher with pretty glasses, students with books, minions with a blue and red scooter, a dog named Jake, and asks questions about characters' names.
Paper: A Solution for the Automated Detection of Clickjacking AttacksMarco Balduzzi
Clickjacking is a web-based attack that has recently received a wide media coverage. In a clickjacking attack, a malicious page is constructed such that it tricks victims into clicking on an element of a different page that is only barely (or not at all) visible. By stealing the victim's clicks, an attacker could force the user to perform an unintended action that is advantageous for the attacker (e.g., initiate an online money transaction). Although clickjacking has been the subject of many discussions and alarming reports, it is currently unclear to what extent clickjacking is being used by attackers in the wild, and how significant the attack is for the security of Internet users. In this paper, we propose a novel solution for the automated and efficient detection of clickjacking attacks. We describe the system that we designed, implemented and deployed to analyze over a million unique web pages. The experiments show that our approach is feasible in practice. Also, the empirical study that we conducted on a large number of popular websites suggests that clickjacking has not yet been largely adopted by attackers on the Internet.
The document discusses Advanced Persistent Threats (APT). It defines APT as sophisticated, targeted cyber attacks that are difficult to detect. APT attacks use advanced techniques like zero-day exploits over multiple phases to steal information from victims like Google, oil companies, and Sony. The challenges of APT are detection, analysis, and containment due to their customization, persistence, and evasion techniques. Case studies of notable APT attacks are provided, including Night Dragon, Stuxnet and attacks on RSA and Sony PlayStation Network. Solutions involve defense-in-depth, user education, and focus on exfiltration detection.
Hacking an ASP.NET website is possible, though difficult. The document discusses vulnerabilities in ASP.NET applications that could allow an attacker to bypass restrictions or execute code. It notes that interacting with native libraries and using mixed assemblies could enable arbitrary code execution if vulnerabilities are present. Insecure managed code, integer overflows, and hash collisions are also discussed as potential attack vectors. The document advocates testing restrictions bypassing, file inclusion vulnerabilities, and other methods of exploiting ASP.NET applications.
VivaConversion! es una compañía líder en marketing de rendimiento que ayuda a hacer crecer negocios online. Ofrecen servicios de auditoría de campañas de Google Ads, optimización de conversión y experiencia de usuario, y gestión de posicionamiento en buscadores mediante el uso de metodologías ágiles y técnicas de SEO como el manejo de robots.txt y enlaces, la generación de contenido y el análisis de datos.
Frameworks y tips para gestionar con éxito procesos SEO en entornos complejosAleyda Solís
¿Cómo alcanzar el éxito SEO en entornos complejos? En esta presentación comparto métodos, flujos de trabajo y criterios a tomar en cuenta al gestionar el proceso SEO para alcanzar resultados.
Avian flu Type A-H5N1 epidemiological model: Puerto Rico as a case studyMariangeles Rivera
This document outlines research on modeling the potential spread of avian influenza A-H5N1 between two cities in Puerto Rico. The objectives are to determine potential outbreaks using a metapopulation network approach in a SIR model for Cayey and Aibonito. The methodology implements a mobility model coupling differential equations for the human populations. Parameters include infection and recovery rates. Future work involves simulations under different scenarios and expanding the model to include more towns. Acknowledgments recognize the University of Puerto Rico at Cayey and mentor for the opportunity.
1. This document describes how to enable and disable hard disk drive (HDD) passwords on Dell client systems using the Client Configuration Toolkit (CCTK).
2. The steps include checking for HDD availability in the BIOS, using the "hddinfo" and "hddpwd" CCTK commands to view HDD details and set passwords, rebooting the system for changes to take effect, and verifying passwords are set properly in the BIOS and through additional CCTK commands.
3. The process to clear an HDD password uses the "hddpwd=" CCTK command along with the valid password that was previously set.
A customizable Enterprise Asset Management presentation you can use to share your learnings with the rest of your team. For more information, visit http://softworx.co.za
This document discusses security threats in cloud computing. It introduces the concept of a threat model for analyzing security problems by identifying attackers, assets, vulnerabilities and threats. The key components of a threat model are described, including different types of attackers like insiders and outsiders, the assets and goals of attackers, and common threats organized using the STRIDE framework. Building an accurate threat model is important for designing appropriate security defenses for a cloud computing system.
HTTP(S)-Based Clustering for Assisted Cybercrime InvestigationsMarco Balduzzi
This document describes SPuNge, a system for using HTTP(S) clustering to assist with cybercrime investigations into targeted attacks. SPuNge processes network traces to cluster similar malicious URLs and group machines that request those URLs. It identifies potential targeted attacks as groups of 2-5 machines from the same industry or country reaching clusters of similar URLs. The system was tested on one week of data and found multiple examples of potential targeted attacks on organizations in technology and oil/gas industries from Russia and China.
HITB2012AMS - SatanCloud: A Journey Into the Privacy and Security Risks of Cl...Marco Balduzzi
This document summarizes the findings of an automated analysis of over 5,000 Amazon Machine Images (AMIs) on Amazon's Elastic Compute Cloud (EC2) platform. The analysis found that a high percentage of AMIs contained known software vulnerabilities, malware infections, leftover credentials, and recoverable deleted files containing sensitive data. The security risks demonstrate that users must take precautions when obtaining and sharing AMIs to avoid unintentionally enabling attacks or compromising privacy.
AIS Exposed. New vulnerabilities and attacks. (HITB AMS 2014)Marco Balduzzi
AIS, Automatic Identification System, is a promoted standard and implementation for vessels traffic safety and monitoring. With more than 400,000 installations worldwide, AIS is currently a mandatory installation for commercial vessels and a de-facto equipment for leisure crafts. AIS is largely used in ports worldwide -- Rotterdam alone monitors over 700 AIS-enabled vessels each day, serving 32,000 seagoing and 87,000 inland vessels a year.
Back in October 2013, during HITB KUL, we showed that AIS is hardly broken, both at implementation and protocol level, and it suffers from severe vulnerabilities like spoofing and man-in-the-middle. In this talk, we extend our research by sharing with the audience several novel attacks that we recently discovered, for example how to extensively disable AIS communications or attack the software installed at back-end by port authorities. By doing so, we hope to raise the necessary awareness and lead the involved parties into calling for a more robust and secure AIS.
Cloud computing security policy framework for mitigating denial of service at...Venkatesh Prabhu
The document proposes a security management framework to mitigate denial of service attacks on cloud storage systems. The framework uses a cloud controller in a virtual machine to control data access management by blocking illegal data access. It aims to provide high-level security mechanisms to detect malicious access in cloud storage systems and implement a security policy framework. The proposed system was found to economically provide scaling and security against DOS attacks, though it has limitations such as taking time for installation and the virtual machine failure causing system shutdown.
All content not indexed by traditional web-based search engines is known as the DeepWeb. Wrongly been associated only with the Onion Routing (TOR), the DeepWeb's ecosystem comprises a number of other anonymous and decentralized networks. The Invisible Internet Project (I2P), FreeNET, and Alternative Domain Names (like Name.Space and OpenNic) are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems (e.g., for cryptolockers).
We designed and implemented a prototype system called DeWA for the automated collection and analysis of the DeepWeb, with the goal of quickly identifying new threats as soon they appear.
In this talk, we provide concrete examples of how using DeWA to detect, e.g., trading of illicit and counterfeit goods, underground forums, privacy leaks, hidden dropzones, malware hosting and TOR-based botnets.
This document discusses the configuration of electrical substations and distribution feeders. It mentions substations, distribution feeders, load points, sectionalizer switches, tie switches, and load joints connecting to other feeders. A new configuration is proposed.
The document introduces several characters including Ruslan and his dog Bibo, a baby with a toy, a sheriff with a big cap, a teacher with pretty glasses, students with books, minions with a blue and red scooter, a dog named Jake, and asks questions about characters' names.
Paper: A Solution for the Automated Detection of Clickjacking AttacksMarco Balduzzi
Clickjacking is a web-based attack that has recently received a wide media coverage. In a clickjacking attack, a malicious page is constructed such that it tricks victims into clicking on an element of a different page that is only barely (or not at all) visible. By stealing the victim's clicks, an attacker could force the user to perform an unintended action that is advantageous for the attacker (e.g., initiate an online money transaction). Although clickjacking has been the subject of many discussions and alarming reports, it is currently unclear to what extent clickjacking is being used by attackers in the wild, and how significant the attack is for the security of Internet users. In this paper, we propose a novel solution for the automated and efficient detection of clickjacking attacks. We describe the system that we designed, implemented and deployed to analyze over a million unique web pages. The experiments show that our approach is feasible in practice. Also, the empirical study that we conducted on a large number of popular websites suggests that clickjacking has not yet been largely adopted by attackers on the Internet.
The document discusses Advanced Persistent Threats (APT). It defines APT as sophisticated, targeted cyber attacks that are difficult to detect. APT attacks use advanced techniques like zero-day exploits over multiple phases to steal information from victims like Google, oil companies, and Sony. The challenges of APT are detection, analysis, and containment due to their customization, persistence, and evasion techniques. Case studies of notable APT attacks are provided, including Night Dragon, Stuxnet and attacks on RSA and Sony PlayStation Network. Solutions involve defense-in-depth, user education, and focus on exfiltration detection.
Hacking an ASP.NET website is possible, though difficult. The document discusses vulnerabilities in ASP.NET applications that could allow an attacker to bypass restrictions or execute code. It notes that interacting with native libraries and using mixed assemblies could enable arbitrary code execution if vulnerabilities are present. Insecure managed code, integer overflows, and hash collisions are also discussed as potential attack vectors. The document advocates testing restrictions bypassing, file inclusion vulnerabilities, and other methods of exploiting ASP.NET applications.
VivaConversion! es una compañía líder en marketing de rendimiento que ayuda a hacer crecer negocios online. Ofrecen servicios de auditoría de campañas de Google Ads, optimización de conversión y experiencia de usuario, y gestión de posicionamiento en buscadores mediante el uso de metodologías ágiles y técnicas de SEO como el manejo de robots.txt y enlaces, la generación de contenido y el análisis de datos.
Frameworks y tips para gestionar con éxito procesos SEO en entornos complejosAleyda Solís
¿Cómo alcanzar el éxito SEO en entornos complejos? En esta presentación comparto métodos, flujos de trabajo y criterios a tomar en cuenta al gestionar el proceso SEO para alcanzar resultados.
El documento habla sobre el secuestro de sesiones en aplicaciones web. Explica que es posible robar la sesión de un usuario mediante ataques como hombre en el medio o cross-site scripting para acceder a información restringida. También menciona herramientas para automatizar el robo de sesiones como Firesheep y recomienda el uso de SSL, filtrado de variables y redes privadas para prevenir este tipo de ataques.
¿Eres un agente o mediador de seguros? ¿Te estás iniciando en las Redes Sociales? Te presentamos un sencillo manual con el que construir y gestionar tu marca personal en la red.
El documento presenta varios temas de interés en informática como crear una página web, blog y video. Explica cómo insertar archivos como Flash, video y gráficas en PowerPoint. También cubre riesgos en internet como virus, phishing y spyware, y pasos para crear un blog y video en Movie Maker. Recomienda estar al día con las herramientas tecnológicas para tener éxito laboral.
En 1974 la Crónica de la Organización Mundial de la
Salud publicó un importante artículo llamando la atención
sobre la importancia de la deficiencia de yodo como problema
de la salud pública y la necesidad de su eliminación, escrito por
un grupo de académicos expertos en el tema, Prof. JB Stanbury
de la Universidad de Harvard, Prof. AM Ermans del Hospital
Saint Pierre, Bélgica, Prof. BS Hetzel de la Universidad de
Monash, Australia, Prof. EA Pretell de la Universidad Peruana
Cayetano Heredia, Perú, y Prof. A Querido del Hospital
algunos casos de tirotoxicosis y el temor a su extensión con
(18)
distribución amplia de yodo . Recién a partir de 1930 varios
(19)
investigadores, entre los que destaca Boussingault , volvieron
a insistir sobre este tema, aconsejando la yodación de la sal para
su uso terapéutico.
Desórdenes por deficiencia de yodo en el Perú
Universitario, Leiden, Holanda .
(15)
En el momento actual hay suficiente evidencia que
demuestra que el impacto social de los desórdenes por
deficiencia de yodo es muy grande y que su prevención resulta
en una mejor calidad de vida y de la productividad, así como
también de la capacidad de educación de los niños y adultos.
Prevención y tratamiento de los DDI
Los desórdenes por deficiencia de yodo pueden ser
exitosamente prevenidos mediante programas de suplementa-
ción de yodo. A través de la historia se han ensayado varios
medios para tal propósito, pero la estrategia más costo-efectiva
y sostenible es el consumo de sal yodada. Los experimentos de
Marine y col.
(16, 17)
entre 1907 a 1921 probaron que la deficiencia
y la suplementación de yodo eran factores dominantes en la
etiología y el control del bocio endémico. El uso experimental
de la sal yodada para la prevención del bocio endémico se llevó
a cabo en Akron, Ohio, con resultados espectaculares y fue
seguida por la distribución de sal yodada en Estados Unidos,
Suiza y otros lugares. El uso clínico de este método, sin
embargo, fue largamente postergado por la ocurrencia de
La presencia de bocio y cretinismo en el antiguo Perú
antecedió a la llegada de los españoles, según comentarios en
crónicas y relatos de la época de la Conquista y el Virreinato. En
(20)
una revisión publicada por JB Lastres se comenta que Cosme
Bueno (1769), refiriéndose a sus observaciones entre los
habitantes del altiplano, escribió “los más de los que allí habitan
son contrahechos, jibados, tartamudos, de ojos torcidos y con
unos deformes tumores en la garganta, que aquí llaman cotos y
otras semejantes deformidades en el cuerpo y sus corres-
pondientes en el ánimo”. Y es lógico aceptar como cierto este
hecho, dado que la deficiencia de yodo en la Cordillera de los
Andes es un fenómeno ambiental permanente desde sus
orígenes.
Luego de la Independencia hasta los años 1950s, la
persistencia del bocio y el cretinismo endémicos en la sierra y la
selva fue reportada por varios autores, cuyos importantes
(20)
5. @R_a_ff_a_e_ll_o
…consists of deceiving a web user into
interacting (in most cases by clicking) with
something different to what the user believes
they are interacting with…
[Clickjacking]
14. @R_a_ff_a_e_ll_o
[Clickjacking]
X-Frame-Options Header
• DENY, prevents any domain from framing the content.
• SAMEORIGIN, which only allows the current site to frame the content.
• ALLOW-FROM uri, which permits the specified 'uri' to frame this page.
(e.g., ALLOW-FROM http://www.example.com)