{"id":84,"date":"2019-04-09T21:58:00","date_gmt":"2019-04-09T21:58:00","guid":{"rendered":"http:\/\/54.157.48.44\/2019\/04\/09\/que-es-un-ataque-de-diccionario-en-la-informatica\/"},"modified":"2019-04-09T21:58:00","modified_gmt":"2019-04-09T21:58:00","slug":"que-es-un-ataque-de-diccionario-en-la-informatica","status":"publish","type":"post","link":"http:\/\/34.227.63.65\/en\/technology\/what-is-a-dictionary-attack-in-computing\/","title":{"rendered":"What is a dictionary attack in computer science?"},"content":{"rendered":"<div style=\"clear: both; text-align: center;\"><span style=\"font-size: large; margin-left: 1em; margin-right: 1em;\"><img fetchpriority=\"high\" decoding=\"async\" alt=\"Resultado de imagen para dictionary attack\" height=\"384\" src=\"https:\/\/inforseguridad.files.wordpress.com\/2016\/11\/6cd45-mtyourmind-10001mb-com.png?w=368&amp;h=221\" width=\"640\" \/><\/span><\/div>\n<p> <ins data-ad-client=\"ca-pub-3431304476422572\" data-ad-format=\"fluid\" data-ad-layout=\"in-article\" data-ad-slot=\"4118880087\" style=\"display: block; text-align: center;\"><\/ins> <span style=\"font-size: large;\"><b>What is it?<\/b><\/span><\/p>\n<p>A dictionary attack in computer science is when an attacker tries to access our credentials, either social networks, a web page using all possible words in the dictionary, if you are the one who uses as password \"casa123\" you are among the possible victims that the victimizer can access.<\/p>\n<p>It is an attack that, due to its level of data, takes a long time to complete unless the attacker manages a bot created by an algorithm that takes dictionary words from a database and starts typing keys automatically, in this case if the website does not provide captcha or other tools for the security of users will probably gain access to an individual's credentials.<br \/><span style=\"font-size: large;\"><b><br \/><\/b><\/span> <!-- Encabezado de pagina --><ins      style=\"display:block\"      data-ad-client=\"ca-pub-3431304476422572\"      data-ad-slot=\"9524261761\"      data-ad-format=\"auto\"      data-full-width-responsive=\"true\"><\/ins> <span style=\"font-size: large;\"><b>How to defend yourself?<\/b><\/span><\/p>\n<p>Use strong passwords, as I mentioned in this <a href=\"http:\/\/34.227.63.65\/en\/technology\/what-is-brute-force-attack\/\">POST<\/a>&nbsp;that it is a brute force attack, a secure password must have 14 letters counting capital letters, numbers and characters. If you want to read how is a secure password go to the post I put there in the link maybe in a next blog post we will talk about how is a secure password.&nbsp; <\/p>\n<p>Constantly changing passwords also makes it more difficult for the attacker to find the password.<\/p>\n<div style=\"text-align: center;\"><!-- Anuncio movil --><ins      style=\"display:inline-block;width:320px;height:100px\"      data-ad-client=\"ca-pub-3431304476422572\"      data-ad-slot=\"1785372542\"><\/ins><\/div>\n<h3>Opinions about this type of attack.<\/h3>\n<p>The attack in my opinion is somewhat silly and is one of the easiest to avoid, however people inexperienced in these matters, are very vulnerable to this type of attack as they think that having a password like this, is much easier to remember, but they forget that it is also easier to hack. This is security or ease of use, YOU CHOOSE....<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00bfQu\u00e9 es? Un ataque de diccionario en la inform\u00e1tica y computaci\u00f3n es aquel que un atacante trata de ingresar a nuestras credenciales, ya sea redes sociales, alguna p\u00e1gina web usando todas las palabras posibles del diccionario, si t\u00fa eres lo que usa como contrase\u00f1a \u00abcasa123\u00bb estas entre las posibles victimas que el victimario pueda acceder. [&hellip;]<\/p>","protected":false},"author":3,"featured_media":123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-84","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/34.227.63.65\/en\/technology\/what-is-a-dictionary-attack-in-computing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"og:description\" content=\"\u00bfQu\u00e9 es? Un ataque de diccionario en la inform\u00e1tica y computaci\u00f3n es aquel que un atacante trata de ingresar a nuestras credenciales, ya sea redes sociales, alguna p\u00e1gina web usando todas las palabras posibles del diccionario, si t\u00fa eres lo que usa como contrase\u00f1a \u00abcasa123\u00bb estas entre las posibles victimas que el victimario pueda acceder. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/34.227.63.65\/en\/technology\/what-is-a-dictionary-attack-in-computing\/\" \/>\n<meta property=\"og:site_name\" content=\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-09T21:58:00+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/6cd45-mtyourmind-10001mb-com.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Johan Astudillo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Johan Astudillo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/\"},\"author\":{\"name\":\"Johan Astudillo\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44\"},\"headline\":\"\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica?\",\"datePublished\":\"2019-04-09T21:58:00+00:00\",\"dateModified\":\"2019-04-09T21:58:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/\"},\"wordCount\":314,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/6cd45-mtyourmind-10001mb-com.png\",\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/\",\"url\":\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/\",\"name\":\"\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/6cd45-mtyourmind-10001mb-com.png\",\"datePublished\":\"2019-04-09T21:58:00+00:00\",\"dateModified\":\"2019-04-09T21:58:00+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#primaryimage\",\"url\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/6cd45-mtyourmind-10001mb-com.png\",\"contentUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/6cd45-mtyourmind-10001mb-com.png\",\"width\":500,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/34.227.63.65\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica?\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/34.227.63.65\/#website\",\"url\":\"http:\/\/34.227.63.65\/\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"description\":\"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress\",\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/34.227.63.65\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/34.227.63.65\/#organization\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"url\":\"http:\/\/34.227.63.65\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"contentUrl\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"width\":512,\"height\":512,\"caption\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44\",\"name\":\"Johan Astudillo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g\",\"caption\":\"Johan Astudillo\"},\"url\":\"http:\/\/34.227.63.65\/en\/author\/johan-astudillo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/34.227.63.65\/en\/technology\/what-is-a-dictionary-attack-in-computing\/","og_locale":"en_US","og_type":"article","og_title":"\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","og_description":"\u00bfQu\u00e9 es? Un ataque de diccionario en la inform\u00e1tica y computaci\u00f3n es aquel que un atacante trata de ingresar a nuestras credenciales, ya sea redes sociales, alguna p\u00e1gina web usando todas las palabras posibles del diccionario, si t\u00fa eres lo que usa como contrase\u00f1a \u00abcasa123\u00bb estas entre las posibles victimas que el victimario pueda acceder. [&hellip;]","og_url":"http:\/\/34.227.63.65\/en\/technology\/what-is-a-dictionary-attack-in-computing\/","og_site_name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","article_published_time":"2019-04-09T21:58:00+00:00","og_image":[{"width":500,"height":300,"url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/6cd45-mtyourmind-10001mb-com.png","type":"image\/png"}],"author":"Johan Astudillo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Johan Astudillo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#article","isPartOf":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/"},"author":{"name":"Johan Astudillo","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44"},"headline":"\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica?","datePublished":"2019-04-09T21:58:00+00:00","dateModified":"2019-04-09T21:58:00+00:00","mainEntityOfPage":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/"},"wordCount":314,"commentCount":0,"publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"image":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/6cd45-mtyourmind-10001mb-com.png","articleSection":["Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/","url":"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/","name":"\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","isPartOf":{"@id":"http:\/\/34.227.63.65\/#website"},"primaryImageOfPage":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#primaryimage"},"image":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/6cd45-mtyourmind-10001mb-com.png","datePublished":"2019-04-09T21:58:00+00:00","dateModified":"2019-04-09T21:58:00+00:00","breadcrumb":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#primaryimage","url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/6cd45-mtyourmind-10001mb-com.png","contentUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/6cd45-mtyourmind-10001mb-com.png","width":500,"height":300},{"@type":"BreadcrumbList","@id":"http:\/\/34.227.63.65\/tecnologia\/que-es-un-ataque-de-diccionario-en-la-informatica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/34.227.63.65\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica?"}]},{"@type":"WebSite","@id":"http:\/\/34.227.63.65\/#website","url":"http:\/\/34.227.63.65\/","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","description":"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress","publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/34.227.63.65\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/34.227.63.65\/#organization","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","url":"http:\/\/34.227.63.65\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/","url":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","contentUrl":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","width":512,"height":512,"caption":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda"},"image":{"@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44","name":"Johan Astudillo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/image\/","url":"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g","contentUrl":"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g","caption":"Johan Astudillo"},"url":"http:\/\/34.227.63.65\/en\/author\/johan-astudillo\/"}]}},"_links":{"self":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/84"}],"collection":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/comments?post=84"}],"version-history":[{"count":0,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/84\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media\/123"}],"wp:attachment":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media?parent=84"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/categories?post=84"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/tags?post=84"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}