{"id":15780,"date":"2018-10-04T17:48:30","date_gmt":"2018-10-04T15:48:30","guid":{"rendered":"https:\/\/www.tecsens.com\/les-23-millors-eines-de-seguretat-gratuites\/"},"modified":"2021-04-16T10:42:55","modified_gmt":"2021-04-16T08:42:55","slug":"les-23-millors-eines-de-seguretat-gratuites","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/","title":{"rendered":"Les 23 millors eines de seguretat gratu\u00eftes"},"content":{"rendered":"<h3>Aqu\u00ed hi ha una s\u00e8rie d&#8217;eines de seguretat gratu\u00eftes excepcionals que sens dubte far\u00e0 que el seu treball de seguretat di\u00e0ria m\u00e9s f\u00e0cil.<\/h3>\n<p>En aquesta llista trobar\u00e0s <strong>les 23 millors eines de seguretat gratu\u00eftes: desxifradors de contrasenyes, sistemes de gesti\u00f3 de vulnerabilitats, analitzadors de xarxes&#8230;<\/strong><\/p>\n<p>Independentment de la seva funci\u00f3 en el camp de la seguretat inform\u00e0tica, seran \u00fatils per a vost\u00e8.<\/p>\n<h2>Preu mitj\u00e0 per nit<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14739\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Maltego-1-300x161.jpg\" alt=\"Eina de seguretat del senyal de Maltego\" width=\"661\" height=\"355\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Maltego-1-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Maltego-1.jpg 745w\" sizes=\"(max-width: 661px) 100vw, 661px\" \/><\/p>\n<p><strong>Aquesta aplicaci\u00f3 forense \u00e9s capa\u00e7 de recopilar informaci\u00f3 publicada a Internet sobre determinades entitats<\/strong> (persones, empreses, organitzacions, llocs web, etc.), i analitzar les relacions entre elles. Maltego presenta els seus resultats a trav\u00e9s d&#8217;una \u00e0mplia varietat d&#8217;elements gr\u00e0fics, el que li permet veure relacions de forma r\u00e0pida i amb gran precisi\u00f3. T\u00e9 una llic\u00e8ncia de pagament, i una llic\u00e8ncia gratu\u00efta amb restriccions. Informaci\u00f3 <a href=\"https:\/\/www.paterva.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Maltego<\/a><\/p>\n<h2>OWASP Zed apoderat d&#8217;atac (ZAP)<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14736\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Zap-300x161.jpg\" alt=\"Eina de seguretat Zap Signal\" width=\"628\" height=\"337\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Zap-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Zap.jpg 745w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p><strong>Zed Attack Proxy \u00e9s responsable de trobar vulnerabilitats presents en una aplicaci\u00f3 web.<\/strong> Proporciona tant esc\u00e0ners autom\u00e0tics com un conjunt d&#8217;utilitats per a recerques manuals. INFORMACI\u00d3 <a href=\"https:\/\/www.owasp.org\/index.php\/OWASP_Zed_Attack_Proxy_Project\" target=\"_blank\" rel=\"noopener noreferrer\">ZAP<\/a><\/p>\n<h2>Samurai Web Marc de Proves<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14742\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Samurai-300x208.png\" alt=\"Eina de seguretat del senyal samurai\" width=\"561\" height=\"389\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Samurai-300x208.png 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Samurai-768x532.png 768w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Samurai.png 805w\" sizes=\"(max-width: 561px) 100vw, 561px\" \/><\/p>\n<p><strong>Samurai Web Testing Framework \u00e9s una m\u00e0quina virtual que cont\u00e9 diverses de les eines de seguretat gratu\u00eftes presents en aquesta llista<\/strong> (Fierce Domain Scan, Maltego, Burp&#8230;), aix\u00ed com funcions com un entorn web per a la prova de bol\u00edgrafs. Es pot descarregar com una imatge VMWare, amb el toolset dins. Com a inconvenients tenim que la llista de correu per a desenvolupadors ha estat inactiva durant diversos anys; a m\u00e9s de la seva \u00faltima versi\u00f3 que es remunta a 2016, de manera que cont\u00e9 versions d&#8217;eines obsoletes. Marc de <a href=\"http:\/\/www.samurai-wtf.org\" target=\"_blank\" rel=\"noopener noreferrer\">proves web d&#8217;Info Samurai<\/a><\/p>\n<h2>Kali Linux<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14745\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Kali-linux-300x162.jpg\" alt=\"Eina de seguretat del senyal kali-linux\" width=\"550\" height=\"297\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Kali-linux-300x162.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Kali-linux.jpg 742w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/p>\n<p><strong>Kali Linux (anteriorment conegut com BackTrack) \u00e9s una distribuci\u00f3 de proves de llapis de Linux.<\/strong> Utilitzat pels professionals de la <a href=\"https:\/\/www.tecsens.com\/ca\/serveis-internet-empreses\/seguretat-informatica\/\">seguretat per<\/a> dur a terme les seves avaluacions, en ell podem trobar tot, des d&#8217;esc\u00e0ners de port a desxifradors de contrasenyes. Est\u00e0 disponible per descarregar com ISO, o fins i tot com una imatge de VM per a VMWare o Hyper-V. Informaci\u00f3 <a href=\"https:\/\/www.kali.org\" target=\"_blank\" rel=\"noopener noreferrer\">Kali Linux<\/a><\/p>\n<h2>Ca\u00edn i Abel<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14748\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Cain-300x161.jpg\" alt=\"Eina de seguretat del senyal de ca\u00edn\" width=\"624\" height=\"335\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Cain-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Cain.jpg 745w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/p>\n<p>Ens trobem davant d&#8217;una <strong>utilitat de recuperaci\u00f3 de contrasenya per a sistemes operatius de Microsoft, fins a Windows XP<\/strong> (l&#8217;eina no s&#8217;ha actualitzat des de 2014). Li permet recuperar f\u00e0cilment una multitud de tipus de contrasenyes, utilitzant diversos m\u00e8todes: captura de tr\u00e0nsit de xarxa, desxifrar contrasenyes xifrades a trav\u00e9s d&#8217;atacs de diccionari, for\u00e7a bruta i criptoan\u00e0lisi, gravaci\u00f3 de converses VoIP, recuperaci\u00f3 de claus de xarxes sense fils, revelar caixes de contrasenyes, descobrir contrasenyes en mem\u00f2ria cau i analitzar protocols d&#8217;encaminament. Info <a href=\"https:\/\/es.wikipedia.org\/wiki\/Ca%C3%ADn_y_Abel_(software)\" target=\"_blank\" rel=\"noopener noreferrer\">Ca\u00edn i Abel<\/a><\/p>\n<h2>Exploraci\u00f3 de domini ferotge<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14751 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Fierce-300x161.jpg\" alt=\"Eina de seguretat del senyal ferotge\" width=\"608\" height=\"326\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Fierce-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Fierce.jpg 745w\" sizes=\"(max-width: 608px) 100vw, 608px\" \/><\/p>\n<p><strong>Fierce destaca els objectius potencials, dins i fora d&#8217;una xarxa corporativa, mitjan\u00e7ant l&#8217;observaci\u00f3 d&#8217;entrades DNS.<\/strong> \u00c9s b\u00e0sicament un script escrit en Perl, desenvolupat per escanejar dominis en q\u00fcesti\u00f3 de minuts, utilitzant m\u00faltiples t\u00e0ctiques. Tot i que el seu autor, Robert Hansen, va tancar el seu blog, podem trobar Fierce en un repositori de Github. Com que els principis subjacents del DNS no han canviat en l&#8217;\u00faltima d\u00e8cada, encara ens pot ser \u00fatil. Informaci\u00f3 ferotge <a href=\"https:\/\/github.com\/davidpepper\/fierce-domain-scanner\/\" target=\"_blank\" rel=\"noopener noreferrer\">escaneig de domini<\/a><\/p>\n<h2>El segador<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14754 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Theharvester-300x161.jpg\" alt=\"Eina de seguretat del senyal de theharvester\" width=\"673\" height=\"361\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Theharvester-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Theharvester-1024x550.jpg 1024w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Theharvester-768x412.jpg 768w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Theharvester-1536x825.jpg 1536w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Theharvester.jpg 1553w\" sizes=\"(max-width: 673px) 100vw, 673px\" \/><\/p>\n<p><strong>El Harvester, un dels favorits entre els provadors de bol\u00edgrafs, \u00e9s una eina d&#8217;intel\u00b7lig\u00e8ncia de codi obert (OSINT).<\/strong> S&#8217;utilitza per obtenir noms de subdomini, adreces electr\u00f2niques i noms d&#8217;usuari relacionats amb el domini, utilitzant fonts p\u00fabliques com Google i LinkedIn. Info <a href=\"https:\/\/github.com\/laramies\/theHarvester\" target=\"_blank\" rel=\"noopener noreferrer\">El Recol\u00b7lector<\/a><\/p>\n<h2>Hping (A prop de Hping<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14757 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Hping3-300x161.jpg\" alt=\"Eina de seguretat del senyal Hping3\" width=\"657\" height=\"352\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Hping3-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Hping3.jpg 745w\" sizes=\"(max-width: 657px) 100vw, 657px\" \/><\/p>\n<p><strong>Hping \u00e9s una eina de l\u00ednia d&#8217;ordres que es pot utilitzar per muntar i analitzar paquets TCP\/IP personalitzats.<\/strong> Es pot utilitzar per provar tallafocs, escaneig de ports, xarxes de proves utilitzant diferents protocols, empremtes digitals del sistema operatiu i com a tra\u00e7a avan\u00e7ada. Es pot executar en Linux, FreeBSD, NetBSD, OpenBSD, Solaris, MacOs X i Windows. No s&#8217;ha actualitzat en anys (encara que tampoc t\u00e9 TCP\/IP). Hping <a href=\"http:\/\/www.hping.org\" target=\"_blank\" rel=\"noopener noreferrer\">d&#8217;informaci\u00f3<\/a><\/p>\n<h2>Joan L&#8217;Esbudellador<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14760 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Johin-the-ripper-300x161.jpg\" alt=\"Johin l'eina de seguretat del senyal d'esbudellador\" width=\"678\" height=\"364\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Johin-the-ripper-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Johin-the-ripper.jpg 745w\" sizes=\"(max-width: 678px) 100vw, 678px\" \/><\/p>\n<p><strong>Aquesta \u00e9s una utilitat de contrasenya disponible per a sistemes Unix, Windows, DOS, BeOS i OpenVMS<\/strong> (encara que \u00e9s possible que h\u00e0giu de construir la versi\u00f3 gratu\u00efta vosaltres mateixos). S&#8217;utilitza principalment per obtenir contrasenyes Unix febles. Informaci\u00f3 <a href=\"https:\/\/www.openwall.com\/john\/\" target=\"_blank\" rel=\"noopener noreferrer\">Joan l&#8217;Esbudellador<\/a><\/p>\n<h2>Nessus<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14763 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Nessus2-300x161.jpg\" alt=\"Eina de seguretat del senyal de Nessus\" width=\"679\" height=\"364\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Nessus2-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Nessus2.jpg 745w\" sizes=\"(max-width: 679px) 100vw, 679px\" \/><\/p>\n<p>\u00c9s una de les <strong>eines d&#8217;avaluaci\u00f3 i configuraci\u00f3 de vulnerabilitat m\u00e9s populars del m\u00f3n.<\/strong> Va comen\u00e7ar com un projecte de codi obert, per\u00f2 m\u00e9s tard va saltar a una llic\u00e8ncia patentada. Malgrat aix\u00f2, Nessus encara \u00e9s lliure per a \u00fas personal en xarxes de casa, on escanejar\u00e0 fins a 16 adreces d&#8217;IP. Com s&#8217;indica al vostre lloc web, Nessus inclou descobriment d&#8217;alta velocitat, auditoria de configuraci\u00f3, perfils d&#8217;actius, descobriment de dades sensible, integraci\u00f3 de gesti\u00f3 de peda\u00e7os i an\u00e0lisi de vulnerabilitat. Informaci\u00f3 <a href=\"https:\/\/www.tenable.com\/products\/nessus-home\" target=\"_blank\" rel=\"noopener noreferrer\">Nessus<\/a><\/p>\n<h2>Nmap<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14766 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Nmap-300x175.jpg\" alt=\"Eina de seguretat del senyal de mapa\" width=\"644\" height=\"376\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Nmap-300x175.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Nmap-1024x598.jpg 1024w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Nmap-768x448.jpg 768w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Nmap.jpg 1081w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/p>\n<p><strong>Nmap \u00e9s una eina de codi obert per a l&#8217;escaneig de xarxes i l&#8217;auditoria de seguretat.<\/strong> M\u00e9s de 20 anys despr\u00e9s del seu llan\u00e7ament, els seus desenvolupadors encara l&#8217;actualitzen. Est\u00e0 dissenyat per escanejar r\u00e0pidament grans xarxes, encara que tamb\u00e9 funciona contra amfitrions \u00fanics. Segons el lloc web de NMap, l&#8217;esc\u00e0ner utilitza paquets IP raw per determinar quins amfitrions estan disponibles a la xarxa, els serveis que aquests amfitrions estan oferint, els sistemes operatius que estan executant, tipus de filtres de paquets \/ tallafocs que s&#8217;estan utilitzant, i moltes altres caracter\u00edstiques. Nmap <a href=\"https:\/\/nmap.org\" target=\"_blank\" rel=\"noopener noreferrer\">d&#8217;informaci\u00f3<\/a><\/p>\n<h2>Openvpn<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14769 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/OpenVpn-300x161.jpg\" alt=\"Eina de seguretat de senyal OpenVpn\" width=\"684\" height=\"367\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/OpenVpn-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/OpenVpn.jpg 745w\" sizes=\"(max-width: 684px) 100vw, 684px\" \/><\/p>\n<p><strong>OpenVPN \u00e9s una eina SSL VPN de codi obert.<\/strong> Funciona en una \u00e0mplia gamma de configuracions, incloent-hi acc\u00e9s remot, VPN punt a punt, seguretat Wi-Fi i solucions d&#8217;acc\u00e9s remot a escala empresarial. Ofereix controls d&#8217;equilibri de c\u00e0rrega, falles i accessos. Est\u00e0 disponible per a m\u00e0quines Windows, OpenBSD, FreeBSD, NetBSD, Mac OS X i Solaris. Informaci\u00f3 <a href=\"https:\/\/openvpn.net\" target=\"_blank\" rel=\"noopener noreferrer\">OpenVPN<\/a><\/p>\n<h2>Ophcrack<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14772 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Ophcrack-300x225.jpg\" alt=\"Eina de seguretat del senyal d'Ophcrack\" width=\"600\" height=\"450\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Ophcrack-300x225.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Ophcrack-768x576.jpg 768w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Ophcrack.jpg 800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong>Ophcrack \u00e9s una eina gratu\u00efta per desxifrar contrasenyes de Windows utilitzant taules de l&#8217;arc de Sant Mart\u00ed.<\/strong> \u00c9s multiplataforma, i t\u00e9 una interf\u00edcie gr\u00e0fica, en la qual mostra gr\u00e0fics en temps real per analitzar contrasenyes. Podeu desxifrar contrasenyes utilitzant hashes LM i NTLM utilitzant les taules de l&#8217;arc de Sant Mart\u00ed gratu\u00eftes disponibles al lloc web. Informaci\u00f3 <a href=\"http:\/\/ophcrack.sourceforge.net\" target=\"_blank\" rel=\"noopener noreferrer\">Ophcrack<\/a><\/p>\n<h2>Seguretat en Python<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14775 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Python-300x161.jpg\" alt=\"Eina de seguretat del senyal de Python\" width=\"598\" height=\"321\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Python-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Python.jpg 745w\" sizes=\"(max-width: 598px) 100vw, 598px\" \/><\/p>\n<p>L&#8217;OWASP Python Security Project es va posar en marxa per crear una versi\u00f3 refor\u00e7ada de Python que permet\u00e9s als desenvolupadors construir aplicacions per al seu \u00fas en entorns d&#8217;alt risc, i va acabar construint la major recopilaci\u00f3 d&#8217;<strong>informaci\u00f3 de seguretat en el llenguatge de programaci\u00f3 Python.<\/strong> Projecte de seguretat Info <a href=\"https:\/\/owasp.org\/about\/\" target=\"_blank\" rel=\"noopener noreferrer\">OWASP Python<\/a><\/p>\n<h2>Wireshark<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14778 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/wireshark-300x147.jpg\" alt=\"eina de seguretat de senyal de wireshark\" width=\"678\" height=\"332\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/wireshark-300x147.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/wireshark-1024x500.jpg 1024w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/wireshark-768x375.jpg 768w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/wireshark.jpg 1279w\" sizes=\"(max-width: 678px) 100vw, 678px\" \/><\/p>\n<p><strong>Wireshark \u00e9s un analitzador que li permet capturar i explorar de forma interactiva el tr\u00e0nsit en una xarxa.<\/strong> Durant els seus m\u00e9s de 20 anys de desenvolupament, s&#8217;ha incorporat una llarga llista de caracter\u00edstiques, incloent la captura en temps real i l&#8217;an\u00e0lisi fora de l\u00ednia, i una inspecci\u00f3 en profunditat de centenars de protocols. \u00c9s multiplataforma, podent c\u00f3rrer a Windows, Linux, X d&#8217;OS, Solaris, FreeBSD, NetBSD, etc. \u00c9s capa\u00e7, entre altres coses, d&#8217;analitzar el tr\u00e0nsit de VoIP; desxifrar el tr\u00e0nsit SSL \/ TLS, WEP i WPA \/ WPA2, i llegir el tr\u00e0nsit transportat per USB, Bluetooth i fins i tot Frame Relay. Informaci\u00f3 <a href=\"https:\/\/www.wireshark.org\" target=\"_blank\" rel=\"noopener noreferrer\">de Wireshark<\/a><\/p>\n<h2>Modsecurity<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14781 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/modsecurity-300x161.jpg\" alt=\"Eina de seguretat de senyal de modsecurity\" width=\"671\" height=\"360\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/modsecurity-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/modsecurity.jpg 745w\" sizes=\"(max-width: 671px) 100vw, 671px\" \/><\/p>\n<p><strong>ModSecurity \u00e9s un conjunt d&#8217;eines per al seguiment, registre i control d&#8217;accessos en temps real de les aplicacions web, desenvolupades per l&#8217;equip Trustwave SpiderLabs.<\/strong> Podeu realitzar un registre complet de les transaccions HTTP, capturant sol\u00b7licituds i respostes completes; realitzar avaluacions de seguretat en curs; i endurir les aplicacions web. Es pot incorporar a una instal\u00b7laci\u00f3 d&#8217;Apache 2.x, o desplegada com un proxy invers per protegir qualsevol servidor web. Informaci\u00f3 <a href=\"https:\/\/www.modsecurity.org\" target=\"_blank\" rel=\"noopener noreferrer\">ModSecurity<\/a><\/p>\n<h2>Correcci\u00f3 de fils<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14784 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Threadfix-300x161.jpg\" alt=\"Eina de seguretat del senyal threadfix\" width=\"644\" height=\"345\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Threadfix-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Threadfix-1024x550.jpg 1024w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Threadfix-768x412.jpg 768w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Threadfix-1536x825.jpg 1536w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Threadfix.jpg 1553w\" sizes=\"(max-width: 644px) 100vw, 644px\" \/><\/p>\n<p><strong>ThreadFix \u00e9s una plataforma de gesti\u00f3 de vulnerabilitat d&#8217;aplicacions de Denim Group.<\/strong> Combina resultats d&#8217;informes d&#8217;aplicacions din\u00e0miques, est\u00e0tiques i interactives. T\u00e9 una edici\u00f3 de comunitat de codi obert, per\u00f2 tamb\u00e9 hi ha una versi\u00f3 de pagament de ThreadFix, amb caracter\u00edstiques avan\u00e7ades. <a href=\"https:\/\/threadfix.it\" target=\"_blank\" rel=\"noopener noreferrer\">Fil d&#8217;informaci\u00f3<\/a><\/p>\n<h2>Burp Suite<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14787 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Burpsuite-300x161.jpg\" alt=\"Eina de seguretat del senyal burpsuite\" width=\"658\" height=\"353\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Burpsuite-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Burpsuite.jpg 745w\" sizes=\"(max-width: 658px) 100vw, 658px\" \/><\/p>\n<p><strong>Burp Suite \u00e9s una plataforma de proves de seguretat d&#8217;aplicaci\u00f3 web.<\/strong> Les seves diverses eines cobreixen tot el proc\u00e9s de proves, des de la cartografia inicial i l&#8217;an\u00e0lisi de la superf\u00edcie d&#8217;atac d&#8217;una aplicaci\u00f3, fins a la recerca i explotaci\u00f3 de vulnerabilitats de seguretat. Portswigger ofereix una edici\u00f3 gratu\u00efta, que no t\u00e9 vulnerabilitats web del navegador i algunes de les eines manuals avan\u00e7ades. <a href=\"https:\/\/portswigger.net\/burp\" target=\"_blank\" rel=\"noopener noreferrer\">Suite Burp d&#8217;informaci\u00f3<\/a><\/p>\n<h2>Metasploit<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14790 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Metasploit-300x161.jpg\" alt=\"Eina de seguretat metasploit Signal\" width=\"654\" height=\"351\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Metasploit-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Metasploit.jpg 745w\" sizes=\"(max-width: 654px) 100vw, 654px\" \/><\/p>\n<p><strong>El Projecte Metasploit \u00e9s un projecte de seguretat que proporciona informaci\u00f3 de vulnerabilitat i ajuda en proves de penetraci\u00f3 i desenvolupament de signatures per a IDS (sistemes de detecci\u00f3 d&#8217;intrusions).<\/strong> Aquest projecte va donar lloc a metasploit Framework, una plataforma de codi obert per escriure eines i gestes de seguretat. El 2009, Rapid7, prove\u00efdor de solucions de gesti\u00f3 de vulnerabilitats, va adquirir Metasploit Project. Des de l&#8217;adquisici\u00f3 del Metasploit Framework, Rapid7 ha afegit dues versions pr\u00f2pies de nucli obert, anomenades Metasploit Express i Metasploit Pro. <a href=\"https:\/\/www.metasploit.com\" target=\"_blank\" rel=\"noopener noreferrer\">Informaci\u00f3 de metasploit<\/a><\/p>\n<h2>Aircrack-ng (A prop de Aircrack-ng)<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14793 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Aircrack-300x175.jpg\" alt=\"Eina de seguretat aircrack Signal\" width=\"619\" height=\"361\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Aircrack-300x175.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Aircrack-1024x598.jpg 1024w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Aircrack-768x448.jpg 768w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Aircrack.jpg 1081w\" sizes=\"(max-width: 619px) 100vw, 619px\" \/><\/p>\n<p><strong>\u00c9s un conjunt complet d&#8217;eines per controlar paquets, maquinari de prova, desxifrar contrasenyes i llan\u00e7ar atacs a xarxes Wi-Fi.<\/strong> El que Wireshark fa a Ethernet, Aircrack-ng fa a trav\u00e9s de Wi-Fi. La versi\u00f3 1.2, llan\u00e7ada a l&#8217;abril de 2018, aporta millores importants en velocitat i seguretat, i amplia la llista de maquinari que suporta. Informaci\u00f3 <a href=\"https:\/\/www.aircrack-ng.org\" target=\"_blank\" rel=\"noopener noreferrer\">d&#8217;Aircrack-ng<\/a><\/p>\n<h2>Cues<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14796 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Tails-300x161.jpg\" alt=\"Eina de seguretat del senyal de cues\" width=\"671\" height=\"360\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Tails-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Tails.jpg 745w\" sizes=\"(max-width: 671px) 100vw, 671px\" \/><\/p>\n<p><strong>L&#8217;Amnesiac Incognito Live System (TAILS) \u00e9s una distribuci\u00f3 en viu de Linux que es pot executar des d&#8217;un dispositiu DVD o USB.<\/strong> No fa el seguiment de les seves activitats d&#8217;una sessi\u00f3 a la seg\u00fcent, i utilitza Tor per a totes les comunicacions a Internet. Podeu revelar la vostra identitat a alg\u00fa que estigui supervisant la connexi\u00f3 Tor si inicieu la sessi\u00f3, per exemple, amb el vostre compte en una xarxa social; Per\u00f2 mentre no facis res d&#8217;aix\u00f2, tails pot ser una gran ajuda per mantenir la seva activitat en l\u00ednia en secret. Informaci\u00f3 <a href=\"https:\/\/tails.boum.org\" target=\"_blank\" rel=\"noopener noreferrer\">TAILS<\/a><\/p>\n<h2>Qubes OS<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14799 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Qubes-300x161.jpg\" alt=\"Eina de seguretat del senyal de Qubes\" width=\"684\" height=\"367\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Qubes-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Qubes.jpg 745w\" sizes=\"(max-width: 684px) 100vw, 684px\" \/><\/p>\n<p><strong>Qubes OS s&#8217;anomena &#8220;un sistema operatiu raonablement segur&#8221;.<\/strong> \u00c9s un sistema operatiu de codi obert orientat a la seguretat. Utilitzeu Xen per compartimentar funcions en diferents m\u00e0quines <em>virtuals o qubes.<\/em> Aix\u00f2 li permet a\u00efllar diferents activitats en diferents qubes. Vost\u00e8 pot, per exemple, fer tot el relacionat amb la banca en l\u00ednia en un qube, i tota la resta en un altre. O fins i tot, anant m\u00e9s enll\u00e0, podeu crear un qube d&#8217;un sol \u00fas per a cada fitxer adjunt de correu electr\u00f2nic que heu obert, ajudant a evitar que un fitxer adjunt malici\u00f3s pren el control de tota la m\u00e0quina. Est\u00e0 disponible com a desc\u00e0rrega gratu\u00efta, per\u00f2 es requereix una m\u00e0quina Intel o AMD de 64 bits amb almenys 4 GB de RAM i 32 GB d&#8217;espai en disc. Informaci\u00f3 <a href=\"https:\/\/www.qubes-os.org\" target=\"_blank\" rel=\"noopener noreferrer\">Qubes OS<\/a><\/p>\n<h2>Senyal<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14802 aligncenter\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Signal-300x161.jpg\" alt=\"Eina de seguretat del senyal\" width=\"632\" height=\"339\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Signal-300x161.jpg 300w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Signal-1024x550.jpg 1024w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Signal-768x412.jpg 768w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Signal-1536x825.jpg 1536w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/Signal.jpg 1553w\" sizes=\"(max-width: 632px) 100vw, 632px\" \/><\/p>\n<p><strong>Acabem aquesta llista d&#8217;eines de seguretat gratu\u00eftes amb Signal, una aplicaci\u00f3 de missatgeria i trucades de veu i v\u00eddeo que ofereix encriptaci\u00f3 d&#8217;extrem a extrem.<\/strong> Ofereix funcions com ara la desaparici\u00f3 de missatges (el remitent pot triar quant de temps es destruir\u00e0 el missatge despr\u00e9s de llegir-lo), els xats de grup xifrats i l&#8217;enviament d&#8217;imatges. Signal \u00e9s recomanat per la Electronic Frontier Foundation com a part de la seva guia &#8220;Vigil\u00e0ncia Autodefensa&#8221;, una guia avan\u00e7ada per protegir l&#8217;espionatge en l\u00ednia. \u00c9s una aplicaci\u00f3 gratu\u00efta i es pot utilitzar en Android, iOS, macOS, Linux i Windows. <a href=\"https:\/\/signal.org\" target=\"_blank\" rel=\"noopener noreferrer\">Senyal d&#8217;informaci\u00f3<\/a><\/p>\n\n<div style=\"height:54px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\">Coneix les eines de seguretat professionals de Tecsens.<\/h2>\n\n<div style=\"height:54px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/ca\/serveis-internet-empreses\/seguretat-informatica\/\" target=\"_blank\" rel=\"noreferrer noopener\">SEGURETAT INFORM\u00c0TICA PER A EMPRESES<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Aqu\u00ed hi ha una s\u00e8rie d&#8217;eines de seguretat gratu\u00eftes excepcionals que sens dubte far\u00e0 que el seu treball de seguretat di\u00e0ria m\u00e9s f\u00e0cil. En aquesta llista trobar\u00e0s les 23 millors eines de seguretat gratu\u00eftes: desxifradors de contrasenyes, sistemes de gesti\u00f3 de vulnerabilitats, analitzadors de xarxes&#8230; Independentment de la seva funci\u00f3 en el camp de la [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":5509,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[496,497],"tags":[396,390,316,399,381,86],"class_list":["post-15780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-consulting-ca","category-seguretat-ti","tag-aplicacions","tag-ciberseguretat","tag-eines","tag-lliure-ca","tag-seguretat","tag-software-ca-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les 23 millors eines de seguretat gratu\u00eftes Tecsens<\/title>\n<meta name=\"description\" content=\"Les 23 millors eines de seguretat gratu\u00eftes de desxifradors de contrasenyes, gestors de vulnerabilitats, analitzadors de xarxa...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les 23 millors eines de seguretat gratu\u00eftes Tecsens\" \/>\n<meta property=\"og:description\" content=\"Les 23 millors eines de seguretat gratu\u00eftes de desxifradors de contrasenyes, gestors de vulnerabilitats, analitzadors de xarxa...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-04T15:48:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-16T08:42:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/broca_texto.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"745\" \/>\n\t<meta property=\"og:image:height\" content=\"457\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"Les 23 millors eines de seguretat gratu\u00eftes\",\"datePublished\":\"2018-10-04T15:48:30+00:00\",\"dateModified\":\"2021-04-16T08:42:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/\"},\"wordCount\":1896,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/broca_texto.jpg\",\"keywords\":[\"Aplicacions\",\"Ciberseguretat\",\"eines\",\"Lliure\",\"Seguretat\",\"software\"],\"articleSection\":[\"Consulting\",\"Seguretat TI\"],\"inLanguage\":\"ca-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/\",\"url\":\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/\",\"name\":\"Les 23 millors eines de seguretat gratu\u00eftes Tecsens\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/broca_texto.jpg\",\"datePublished\":\"2018-10-04T15:48:30+00:00\",\"dateModified\":\"2021-04-16T08:42:55+00:00\",\"description\":\"Les 23 millors eines de seguretat gratu\u00eftes de desxifradors de contrasenyes, gestors de vulnerabilitats, analitzadors de xarxa...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#breadcrumb\"},\"inLanguage\":\"ca-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/broca_texto.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/broca_texto.jpg\",\"width\":745,\"height\":457,\"caption\":\"Les 23 millors eines de seguretat gratu\u00eftes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les 23 millors eines de seguretat gratu\u00eftes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les 23 millors eines de seguretat gratu\u00eftes Tecsens","description":"Les 23 millors eines de seguretat gratu\u00eftes de desxifradors de contrasenyes, gestors de vulnerabilitats, analitzadors de xarxa...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/","og_locale":"ca_ES","og_type":"article","og_title":"Les 23 millors eines de seguretat gratu\u00eftes Tecsens","og_description":"Les 23 millors eines de seguretat gratu\u00eftes de desxifradors de contrasenyes, gestors de vulnerabilitats, analitzadors de xarxa...","og_url":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/","og_site_name":"Tecsens","article_published_time":"2018-10-04T15:48:30+00:00","article_modified_time":"2021-04-16T08:42:55+00:00","og_image":[{"width":745,"height":457,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/broca_texto.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"Les 23 millors eines de seguretat gratu\u00eftes","datePublished":"2018-10-04T15:48:30+00:00","dateModified":"2021-04-16T08:42:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/"},"wordCount":1896,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/broca_texto.jpg","keywords":["Aplicacions","Ciberseguretat","eines","Lliure","Seguretat","software"],"articleSection":["Consulting","Seguretat TI"],"inLanguage":"ca-ES"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/","url":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/","name":"Les 23 millors eines de seguretat gratu\u00eftes Tecsens","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/broca_texto.jpg","datePublished":"2018-10-04T15:48:30+00:00","dateModified":"2021-04-16T08:42:55+00:00","description":"Les 23 millors eines de seguretat gratu\u00eftes de desxifradors de contrasenyes, gestors de vulnerabilitats, analitzadors de xarxa...","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#breadcrumb"},"inLanguage":"ca-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/"]}]},{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/broca_texto.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2018\/10\/broca_texto.jpg","width":745,"height":457,"caption":"Les 23 millors eines de seguretat gratu\u00eftes"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/ca\/les-23-millors-eines-de-seguretat-gratuites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Les 23 millors eines de seguretat gratu\u00eftes"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca-ES"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/15780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/comments?post=15780"}],"version-history":[{"count":8,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/15780\/revisions"}],"predecessor-version":[{"id":22672,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/posts\/15780\/revisions\/22672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media\/5509"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/media?parent=15780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/categories?post=15780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/ca\/wp-json\/wp\/v2\/tags?post=15780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}