{"id":5468,"date":"2023-04-21T11:11:42","date_gmt":"2023-04-21T17:11:42","guid":{"rendered":"https:\/\/b2v.mx\/media\/?p=5468"},"modified":"2023-04-21T11:27:05","modified_gmt":"2023-04-21T17:27:05","slug":"chatgpt-ciber-operaciones-ofensivas","status":"publish","type":"post","link":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/","title":{"rendered":"ChatGPT: \u00bfUna herramienta para ciber operaciones ofensivas? \u00a1No tan r\u00e1pido!"},"content":{"rendered":"\n<p><em>\u00bfUtilizar el ChatGPT o no utilizar el ChatGPT? Esa es la cuesti\u00f3n predominante en el panorama cibern\u00e9tico estos d\u00edas.<\/em><\/p>\n\n\n\n<p>Por: John Borrero Rodriguez | Investigador Senior de seguridad ofensiva en el Centro de Investigaci\u00f3n Avanzada de Trellix&nbsp;<\/p>\n\n\n\n<p>No es sorpresa que los bots de Inteligencia Artificial (IA) hayan tomado a la sociedad por asalto. Por el contrario, FAIR de Meta, LaMDA de Google, Watson de IBM y Cortana de Microsoft, son ejemplos de diferentes grados variables de bots de inteligencia artificial. Watson debut\u00f3 incluso en el popular programa \u201cJeopardy\u201d en febrero de 2011.&nbsp;<\/p>\n\n\n\n<p>La Inteligencia Artificial no es un concepto nuevo; lo que es nuevo es que el ChatGPT es f\u00e1cilmente accesible para millones de personas alrededor del mundo y no requiere de pagar una alta tarifa para usarlo. A\u00fan as\u00ed, ha sido aclamado como algo novedoso que podr\u00eda ser una amenaza inmediata, ya que puede ser utilizado por actores de ciber amenazas para facilitar los ataques.&nbsp;<\/p>\n\n\n\n<p><strong>\u00bfUn elegante escritor de malware o tan solo un c\u00f3digo pobremente conceptualizado?<\/strong><\/p>\n\n\n\n<p>La habilidad del ChatGPT para escribir malware es limitada, durante su presentaci\u00f3n el internet estaba plagado con ejemplos de \u201cmalware\u201d escrito por la plataforma. Al momento de escribir este art\u00edculo, est\u00e1 severamente limitado si no completamente bloqueado. Dadas las recientes actualizaciones a su modelo y la pol\u00edtica de uso, se puede limitar su habilidad para hacer mucho de algo con excepci\u00f3n de su prop\u00f3sito designado.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"913\" height=\"252\" src=\"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-2.jpg\" alt=\" ChatGPT inteligencia artificial \" class=\"wp-image-5470\" srcset=\"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-2.jpg 913w, https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-2-300x83.jpg 300w, https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-2-768x212.jpg 768w, https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-2-600x166.jpg 600w\" sizes=\"(max-width: 913px) 100vw, 913px\" \/><\/figure>\n\n\n\n<p>En un intento por forzar al modelo a escribir una plantilla que pudiera ser usada para malware, result\u00f3 en una arquitectura b\u00e1sica servidor-cliente. El c\u00f3digo del servidor puede verse en la Figura 2. \u00bfEs realmente \u00fatil para crear una implementaci\u00f3n de comandos y control? No, hay otras avenidas para encontrar marcos y repositorios en internet que est\u00e1n fuera del alcance de este art\u00edculo.&nbsp;<\/p>\n\n\n\n<p>De acuerdo con el Investigador Principal Senior, Richard Johnson, una oportunidad potencial es darle al ChatGPT detalles de una campa\u00f1a de inteligencia de open-source en un objetivo espec\u00edfico, y dejarlo crear plantillas de ingenier\u00eda social. Este es un mejor uso de las actuales capacidades y una que potencialmente ya se est\u00e1 aplicando en el mundo.&nbsp;<\/p>\n\n\n\n<p>Los escritores y los que defienden del malware est\u00e1n constantemente en el juego de \u201cel gato y el rat\u00f3n\u201d. Nuevas t\u00e9cnicas se implementan a un ritmo r\u00e1pido por actores avanzados de amenazas y los defensores se apresuran a entenderlas. Esto requiere profunda comprensi\u00f3n e investigaci\u00f3n de aplicaciones y sistemas operativos internos.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"630\" height=\"786\" src=\"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-3.jpg\" alt=\" ChatGPT inteligencia artificial \" class=\"wp-image-5471\" srcset=\"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-3.jpg 630w, https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-3-240x300.jpg 240w, https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-3-600x749.jpg 600w\" sizes=\"(max-width: 630px) 100vw, 630px\" \/><\/figure>\n\n\n\n<p>El copilot GitHub de Microsoft facilita la escritura del c\u00f3digo usando OpenAI Codex e ingiriendo todos los repositorios de c\u00f3digos p\u00fablicos GitHub. Luego va a trav\u00e9s de un modelo de predicci\u00f3n y sugiere un c\u00f3digo para el escritor. El escritor puede solo agregar comentarios al c\u00f3digo y el copilot sugerir\u00e1 un c\u00f3digo funcional. Una distinci\u00f3n importante es que el copilot de Microsoft utiliza el OpenAI Codex. Este modo est\u00e1 dise\u00f1ado espec\u00edficamente para generar c\u00f3digos. El ChatGPT est\u00e1 dise\u00f1ado para texto conversacional. En una comparaci\u00f3n, copilot eclipsa al ChatGPT en capacidad de herramientas ofensivas. Tan solo al darle la intenci\u00f3n del c\u00f3digo deseado, copilot puede sugerir un c\u00f3digo funcional. Dado que se alimenta directamente al entorno de desarrollo, el c\u00f3digo puede compilarse en un ejecutable. La extensi\u00f3n de copilot est\u00e1 disponible para una multitud de lenguajes de programaci\u00f3n, haci\u00e9ndolo vers\u00e1til para la generaci\u00f3n de malware dirigido, aunque un autor h\u00e1bil necesita asegurar una funcionalidad adecuada. Un ejemplo b\u00e1sico del uso de copilot puede observarse abajo<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"958\" height=\"469\" src=\"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-4.jpg\" alt=\" ChatGPT inteligencia artificial \" class=\"wp-image-5472\" srcset=\"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-4.jpg 958w, https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-4-300x147.jpg 300w, https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-4-768x376.jpg 768w, https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-4-600x294.jpg 600w\" sizes=\"(max-width: 958px) 100vw, 958px\" \/><\/figure>\n\n\n\n<p>Los actores de amenazas avanzados han demostrado constantemente un nivel de experiencia y delicadeza necesarios para lograr sus objetivos. El ChatGPT ofrece un m\u00e9todo mediocre no intencional para que actores de amenazas compongan un malware mal escrito. Tome un adversario en constante evoluci\u00f3n como Turla, cuyas capacidades se han movido de usar el arcaico PowerShell a ejecutar su nuevo malware Kazuar and .NET obfuscator. Un adversario bien definido entiende las huellas y capacidades de sus objetivos, qu\u00e9 es un defecto del ChatGPT. En varias pruebas, el malware creado por el ChatGPT no era funcional o inmediatamente detectado por las soluciones de seguridad de Trellix, demostrando su falta de originalidad y creatividad requeridas en el cambiante panorama de amenazas actual. El modelo ofreci\u00f3 un excelente plano para ayudar a entender diferentes m\u00e9todos de implementar soluciones de software, pero est\u00e1 muy lejos de ser un producto viable para operaciones ofensivas.\u00a0<\/p>\n\n\n\n<p>Descargo de responsabilidad&nbsp;<\/p>\n\n\n\n<p class=\"has-small-font-size\">Este documento y la informaci\u00f3n contenida en \u00e9l, describe la investigaci\u00f3n de seguridad de computadores con prop\u00f3sitos educativos solamente y para la conveniencia de los clientes de Trellix. Cualquier intento por recrear parte o todas las actividades descritas, es bajo el riesgo del usuario y ni Trellix ni sus afiliados tendr\u00e1n ninguna responsabilidad o compromiso.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfUtilizar el ChatGPT o no utilizar el ChatGPT? Esa es la cuesti\u00f3n predominante en el panorama cibern\u00e9tico estos d\u00edas. Por: John Borrero Rodriguez | Investigador Senior de seguridad ofensiva en el Centro de Investigaci\u00f3n Avanzada de Trellix&nbsp; No es sorpresa que los bots de Inteligencia Artificial (IA) hayan tomado a la sociedad por asalto. Por [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5469,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[235],"tags":[285,425],"class_list":["post-5468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-chatgpt","tag-inteligenciaartificial"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ChatGPT: \u00bfUna herramienta para ciber operaciones ofensivas? \u00a1No tan r\u00e1pido! - B2V Media<\/title>\n<meta name=\"description\" content=\"\u00bfUtilizar el ChatGPT o no utilizar el ChatGPT? Esa es la cuesti\u00f3n predominante en el panorama cibern\u00e9tico estos d\u00edas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ChatGPT: \u00bfUna herramienta para ciber operaciones ofensivas? \u00a1No tan r\u00e1pido! - B2V Media\" \/>\n<meta property=\"og:description\" content=\"\u00bfUtilizar el ChatGPT o no utilizar el ChatGPT? Esa es la cuesti\u00f3n predominante en el panorama cibern\u00e9tico estos d\u00edas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/\" \/>\n<meta property=\"og:site_name\" content=\"B2V Media\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/b2vmx\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/b2vmx\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-21T17:11:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-21T17:27:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-1-scaled.jpg?fit=2560%2C1707&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/b2vmx\" \/>\n<meta name=\"twitter:site\" content=\"@b2v_mx\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/chatgpt-ciber-operaciones-ofensivas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/chatgpt-ciber-operaciones-ofensivas\\\/\"},\"author\":{\"name\":\"Editor\",\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/#\\\/schema\\\/person\\\/19975bd0e669232f9c601ca6a3879095\"},\"headline\":\"ChatGPT: \u00bfUna herramienta para ciber operaciones ofensivas? \u00a1No tan r\u00e1pido!\",\"datePublished\":\"2023-04-21T17:11:42+00:00\",\"dateModified\":\"2023-04-21T17:27:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/chatgpt-ciber-operaciones-ofensivas\\\/\"},\"wordCount\":849,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/chatgpt-ciber-operaciones-ofensivas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/b2v.mx\\\/media\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/chat-1-scaled.jpg\",\"keywords\":[\"CHATGPT\",\"inteligenciaartificial\"],\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/b2v.mx\\\/media\\\/chatgpt-ciber-operaciones-ofensivas\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/chatgpt-ciber-operaciones-ofensivas\\\/\",\"url\":\"https:\\\/\\\/b2v.mx\\\/media\\\/chatgpt-ciber-operaciones-ofensivas\\\/\",\"name\":\"ChatGPT: \u00bfUna herramienta para ciber operaciones ofensivas? \u00a1No tan r\u00e1pido! - B2V Media\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/chatgpt-ciber-operaciones-ofensivas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/chatgpt-ciber-operaciones-ofensivas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/b2v.mx\\\/media\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/chat-1-scaled.jpg\",\"datePublished\":\"2023-04-21T17:11:42+00:00\",\"dateModified\":\"2023-04-21T17:27:05+00:00\",\"description\":\"\u00bfUtilizar el ChatGPT o no utilizar el ChatGPT? Esa es la cuesti\u00f3n predominante en el panorama cibern\u00e9tico estos d\u00edas.\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/b2v.mx\\\/media\\\/chatgpt-ciber-operaciones-ofensivas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/chatgpt-ciber-operaciones-ofensivas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/b2v.mx\\\/media\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/chat-1-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/b2v.mx\\\/media\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/chat-1-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"ChatGPT\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/#website\",\"url\":\"https:\\\/\\\/b2v.mx\\\/media\\\/\",\"name\":\"B2V Media\",\"description\":\"Sitio de Contenidos de Negocios\",\"publisher\":{\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/#organization\"},\"alternateName\":\"B2V MX\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/b2v.mx\\\/media\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/#organization\",\"name\":\"B2V Media\",\"alternateName\":\"B2V MX\",\"url\":\"https:\\\/\\\/b2v.mx\\\/media\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/b2v.mx\\\/media\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logos_Mesa-de-trabajo-1-1.png\",\"contentUrl\":\"https:\\\/\\\/b2v.mx\\\/media\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logos_Mesa-de-trabajo-1-1.png\",\"width\":1080,\"height\":1080,\"caption\":\"B2V Media\"},\"image\":{\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/b2vmx\",\"https:\\\/\\\/x.com\\\/b2v_mx\",\"https:\\\/\\\/www.instagram.com\\\/b2vmx\\\/\",\"https:\\\/\\\/linkedin.com\\\/business\\\/b2vmx\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/b2v.mx\\\/media\\\/#\\\/schema\\\/person\\\/19975bd0e669232f9c601ca6a3879095\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/20af5fb450db1167afd101d6b4d43d4c1fb63be46f1e3adcfeb12b0ffd4b44bf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/20af5fb450db1167afd101d6b4d43d4c1fb63be46f1e3adcfeb12b0ffd4b44bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/20af5fb450db1167afd101d6b4d43d4c1fb63be46f1e3adcfeb12b0ffd4b44bf?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"sameAs\":[\"https:\\\/\\\/b2v.mx\",\"https:\\\/\\\/facebook.com\\\/b2vmx\",\"https:\\\/\\\/www.instagram.com\\\/b2vmx\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/b2vmx\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/www.twitter.com\\\/b2vmx\",\"https:\\\/\\\/www.youtube.com\\\/@B2Vyoutube\"],\"url\":\"https:\\\/\\\/b2v.mx\\\/media\\\/author\\\/editor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ChatGPT: \u00bfUna herramienta para ciber operaciones ofensivas? \u00a1No tan r\u00e1pido! - B2V Media","description":"\u00bfUtilizar el ChatGPT o no utilizar el ChatGPT? Esa es la cuesti\u00f3n predominante en el panorama cibern\u00e9tico estos d\u00edas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/","og_locale":"es_ES","og_type":"article","og_title":"ChatGPT: \u00bfUna herramienta para ciber operaciones ofensivas? \u00a1No tan r\u00e1pido! - B2V Media","og_description":"\u00bfUtilizar el ChatGPT o no utilizar el ChatGPT? Esa es la cuesti\u00f3n predominante en el panorama cibern\u00e9tico estos d\u00edas.","og_url":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/","og_site_name":"B2V Media","article_publisher":"https:\/\/www.facebook.com\/b2vmx","article_author":"https:\/\/facebook.com\/b2vmx","article_published_time":"2023-04-21T17:11:42+00:00","article_modified_time":"2023-04-21T17:27:05+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/i0.wp.com\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-1-scaled.jpg?fit=2560%2C1707&ssl=1","type":"image\/jpeg"}],"author":"Editor","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/b2vmx","twitter_site":"@b2v_mx","twitter_misc":{"Escrito por":"Editor","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/#article","isPartOf":{"@id":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/"},"author":{"name":"Editor","@id":"https:\/\/b2v.mx\/media\/#\/schema\/person\/19975bd0e669232f9c601ca6a3879095"},"headline":"ChatGPT: \u00bfUna herramienta para ciber operaciones ofensivas? \u00a1No tan r\u00e1pido!","datePublished":"2023-04-21T17:11:42+00:00","dateModified":"2023-04-21T17:27:05+00:00","mainEntityOfPage":{"@id":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/"},"wordCount":849,"commentCount":0,"publisher":{"@id":"https:\/\/b2v.mx\/media\/#organization"},"image":{"@id":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/#primaryimage"},"thumbnailUrl":"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-1-scaled.jpg","keywords":["CHATGPT","inteligenciaartificial"],"articleSection":["Tecnolog\u00eda"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/","url":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/","name":"ChatGPT: \u00bfUna herramienta para ciber operaciones ofensivas? \u00a1No tan r\u00e1pido! - B2V Media","isPartOf":{"@id":"https:\/\/b2v.mx\/media\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/#primaryimage"},"image":{"@id":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/#primaryimage"},"thumbnailUrl":"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-1-scaled.jpg","datePublished":"2023-04-21T17:11:42+00:00","dateModified":"2023-04-21T17:27:05+00:00","description":"\u00bfUtilizar el ChatGPT o no utilizar el ChatGPT? Esa es la cuesti\u00f3n predominante en el panorama cibern\u00e9tico estos d\u00edas.","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/b2v.mx\/media\/chatgpt-ciber-operaciones-ofensivas\/#primaryimage","url":"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-1-scaled.jpg","contentUrl":"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2023\/04\/chat-1-scaled.jpg","width":2560,"height":1707,"caption":"ChatGPT"},{"@type":"WebSite","@id":"https:\/\/b2v.mx\/media\/#website","url":"https:\/\/b2v.mx\/media\/","name":"B2V Media","description":"Sitio de Contenidos de Negocios","publisher":{"@id":"https:\/\/b2v.mx\/media\/#organization"},"alternateName":"B2V MX","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2v.mx\/media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/b2v.mx\/media\/#organization","name":"B2V Media","alternateName":"B2V MX","url":"https:\/\/b2v.mx\/media\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/b2v.mx\/media\/#\/schema\/logo\/image\/","url":"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2020\/04\/Logos_Mesa-de-trabajo-1-1.png","contentUrl":"https:\/\/b2v.mx\/media\/wp-content\/uploads\/2020\/04\/Logos_Mesa-de-trabajo-1-1.png","width":1080,"height":1080,"caption":"B2V Media"},"image":{"@id":"https:\/\/b2v.mx\/media\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/b2vmx","https:\/\/x.com\/b2v_mx","https:\/\/www.instagram.com\/b2vmx\/","https:\/\/linkedin.com\/business\/b2vmx"]},{"@type":"Person","@id":"https:\/\/b2v.mx\/media\/#\/schema\/person\/19975bd0e669232f9c601ca6a3879095","name":"Editor","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/20af5fb450db1167afd101d6b4d43d4c1fb63be46f1e3adcfeb12b0ffd4b44bf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/20af5fb450db1167afd101d6b4d43d4c1fb63be46f1e3adcfeb12b0ffd4b44bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/20af5fb450db1167afd101d6b4d43d4c1fb63be46f1e3adcfeb12b0ffd4b44bf?s=96&d=mm&r=g","caption":"Editor"},"sameAs":["https:\/\/b2v.mx","https:\/\/facebook.com\/b2vmx","https:\/\/www.instagram.com\/b2vmx","https:\/\/www.linkedin.com\/company\/b2vmx","https:\/\/x.com\/https:\/\/www.twitter.com\/b2vmx","https:\/\/www.youtube.com\/@B2Vyoutube"],"url":"https:\/\/b2v.mx\/media\/author\/editor\/"}]}},"_links":{"self":[{"href":"https:\/\/b2v.mx\/media\/wp-json\/wp\/v2\/posts\/5468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2v.mx\/media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2v.mx\/media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2v.mx\/media\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/b2v.mx\/media\/wp-json\/wp\/v2\/comments?post=5468"}],"version-history":[{"count":1,"href":"https:\/\/b2v.mx\/media\/wp-json\/wp\/v2\/posts\/5468\/revisions"}],"predecessor-version":[{"id":5473,"href":"https:\/\/b2v.mx\/media\/wp-json\/wp\/v2\/posts\/5468\/revisions\/5473"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2v.mx\/media\/wp-json\/wp\/v2\/media\/5469"}],"wp:attachment":[{"href":"https:\/\/b2v.mx\/media\/wp-json\/wp\/v2\/media?parent=5468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2v.mx\/media\/wp-json\/wp\/v2\/categories?post=5468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2v.mx\/media\/wp-json\/wp\/v2\/tags?post=5468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}