Dashboard » Noticias
Rafael Peru Crackers
Alejandro Canosa Ferreiro
Omar Jacobo Muñoz Veliz
Rafael Peru Crackers
Rafael Peru Crackers
Andres Galeano
Noticias sobre ciberseguridad
Introducción a la Ingeniería Inversa Capitulo II
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074304Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5bb36902bfb72f42c848a9ee7a8b89331df794cd7f4b71801f6276376e201c31)
En el capítulo anterior observamos como saltamos la validación de..
Realizando Pruebas de Seguridad con el Framework Faraday
![](https://bta-plataform-prod.s3.amazonaws.com/variants/nkdLau4xJNJB9ZgFS8k18aX8/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22252860.jpg%22%3B%20filename%2A%3DUTF-8%27%27252860.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074304Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=d0b32743c6491bdca454480f60394e0c6ff6d27d865810f85673e4c44d2e9059)
Una vez que se comprende el cómo realizar un Pentest, es necesari..
Escaneando Vulnerabilidades en vBulletin con VBScan
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074304Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=1dfdbf92ed2571f87bbce1e55f52765c7df57e6ba47598b085dbd09f08677819)
En Internet, existe una infinidad de sitios, los cuales manejan e..
Instalando Kali Linux
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074304Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5bb36902bfb72f42c848a9ee7a8b89331df794cd7f4b71801f6276376e201c31)
En este pequeño tutorial se explicara como instalar Kali de mane..
Realizando Ingeniería inversa a perfect keylogger
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074304Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=5bb36902bfb72f42c848a9ee7a8b89331df794cd7f4b71801f6276376e201c31)
Perfect keylogger es una herramienta popular que gano varios prem..
Usando el exploit eternalblue de la NSA
![](https://bta-plataform-prod.s3.amazonaws.com/variants/KFDx9kgK6xwdzPKKg5yBduZg/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22foto.jpg%22%3B%20filename%2A%3DUTF-8%27%27foto.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240716%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240716T074305Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=c23a0a236ba17f90a4db85837cc5c6ff29d6cade268f4b4eb363154d783fbb4f)
El 8 de abril el grupo The Shadow Brokers luego de haber ingresad..