Dashboard » Rafael Peru Crackers » Mis artículos
Rafael Peru Crackers
@Lior
Rafael Peru Crackers
Rafael Peru Crackers
Rafael Peru Crackers
Rafael Peru Crackers
Rafael Peru Crackers
Rafael Peru Crackers
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/98467ed25ae983f22a2700b37d12b9ff5ec7e165ffbac2a45df48c6ec64b28f8?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T123350Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=2386afc2c7eff4b3c7188e00731880996a1ff56304989b5548df6b16ef4dbc9d)
Rafael Peru Crackers
@Lior
Blogger
Escribe artículos para la comunidad
Introducción a la Ingeniería Inversa Capitulo III
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T123350Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=38e861fa0aef5286b18b61e2462b4ba4bfc13de504c6e928e032998ccde8127f)
En este punto veremos este metodo de protección llamado CD-CHECK,..
Introducción a la Ingeniería Inversa Capitulo II
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T123350Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=38e861fa0aef5286b18b61e2462b4ba4bfc13de504c6e928e032998ccde8127f)
En el capítulo anterior observamos como saltamos la validación de..
Instalando Kali Linux
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T123350Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=38e861fa0aef5286b18b61e2462b4ba4bfc13de504c6e928e032998ccde8127f)
En este pequeño tutorial se explicara como instalar Kali de mane..
Realizando Ingeniería inversa a perfect keylogger
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T123350Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=38e861fa0aef5286b18b61e2462b4ba4bfc13de504c6e928e032998ccde8127f)
Perfect keylogger es una herramienta popular que gano varios prem..
Introducción a la ingeniería inversa Capitulo I
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T123351Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=6a37d7a823380f8d0297419eba179556f171c7e3af288b65776c44fd9cbbf7fa)
Para muchos el término cracking, es relacionado a lo ilegal, y q..
Realizando ingeniería inversa a keylogger ardamax.
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T123351Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=6a37d7a823380f8d0297419eba179556f171c7e3af288b65776c44fd9cbbf7fa)
Hola comunidad de backtrackacademy, hoy se explicare como reverse..