Dashboard » Noticias
Rafael Peru Crackers
Alejandro Canosa Ferreiro
Omar Jacobo Muñoz Veliz
Rafael Peru Crackers
Rafael Peru Crackers
Andres Galeano
Noticias sobre ciberseguridad
Introducción a la Ingeniería Inversa Capitulo II
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T035315Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=3772439e893987a88eee789d5e5106ff0a0f926cbff9883436e5af470dadc30e)
En el capítulo anterior observamos como saltamos la validación de..
Realizando Pruebas de Seguridad con el Framework Faraday
![](https://bta-plataform-prod.s3.amazonaws.com/variants/nkdLau4xJNJB9ZgFS8k18aX8/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22252860.jpg%22%3B%20filename%2A%3DUTF-8%27%27252860.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T035315Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=c5f25a21ddcb098868bfbd7f9932c5fc4f2eb52243322c95222ff56c2480f941)
Una vez que se comprende el cómo realizar un Pentest, es necesari..
Escaneando Vulnerabilidades en vBulletin con VBScan
![](https://bta-plataform-prod.s3.amazonaws.com/variants/47k6GKi9HNg64kv9QMSmUBQN/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22profile.jpg%22%3B%20filename%2A%3DUTF-8%27%27profile.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T035315Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=bf480f4335cbecad3e3258163a443e5bc7a347cb02f5cbdffea3160e21e61664)
En Internet, existe una infinidad de sitios, los cuales manejan e..
Instalando Kali Linux
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T035315Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=3772439e893987a88eee789d5e5106ff0a0f926cbff9883436e5af470dadc30e)
En este pequeño tutorial se explicara como instalar Kali de mane..
Realizando Ingeniería inversa a perfect keylogger
![](https://bta-plataform-prod.s3.amazonaws.com/variants/CmCy3gzYAAbuzueAwV42RYZB/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%2241473879_681300015589328_2914457510192611328_n.jpg%22%3B%20filename%2A%3DUTF-8%27%2741473879_681300015589328_2914457510192611328_n.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T035316Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=cb41cdf10885ebe20a6d5eba68150b96001202c91fba147a10d2b4d0f936c778)
Perfect keylogger es una herramienta popular que gano varios prem..
Usando el exploit eternalblue de la NSA
![](https://bta-plataform-prod.s3.amazonaws.com/variants/KFDx9kgK6xwdzPKKg5yBduZg/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22foto.jpg%22%3B%20filename%2A%3DUTF-8%27%27foto.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T035316Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=e13d0f0b18ebf02555358db19e3b327922d2fd08b566caee569913d9c949b87b)
El 8 de abril el grupo The Shadow Brokers luego de haber ingresad..