<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" 
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:georss="http://www.georss.org/georss"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:meneame="http://meneame.net/faq-es.php"
 >
<channel>
	<title>Reverse: en cola</title>
	<atom:link href="http://www.meneame.net/m/Reverse/rss?status=queued" rel="self" type="application/rss+xml" />
	<link>http://www.meneame.net/queue</link>
	<image><title>Reverse: en cola</title><link>http://www.meneame.net/queue</link><url>http://cdn.mnmstatic.net/m/Reverse/img/mnm/eli-rss.png</url></image>
	<description>Sitio colaborativo de publicación y comunicación entre blogs</description>
	<pubDate>Mon, 06 Apr 2015 22:24:10 +0000</pubDate>
	<generator>http://blog.meneame.net/</generator>
	<language>es</language>
	<item>
		<meneame:link_id>2385870</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>16</meneame:clicks>
		<meneame:votes>4</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>5</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/decompiladores-java-online?utm_source=meneame_rss</meneame:url>
		<title>Decompiladores de Java online</title>
		<link>https://www.meneame.net/m/Reverse/decompiladores-java-online</link>
		<comments>https://www.meneame.net/m/Reverse/decompiladores-java-online</comments>
		<pubDate>Mon, 06 Apr 2015 22:24:10 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[java]]></category>
		<guid>https://www.meneame.net/m/Reverse/decompiladores-java-online</guid>
		<description><![CDATA[<p>Si te encuentras en la necesidad, por el motivo que sea, de tener que acceder al código fuente de una aplicación Java y obviamente no tienes acceso al mismo, la mejor opción en la mayoría de los casos es usar un decompilador. Por la naturaleza de la arquitectura del lenguaje Java, a menos que la aplicación que tenemos entre manos haya sido ofuscada, el resultado de la decompilación suele ser bastante precisa, con quizás algunas excepciones.</p><p><strong>etiquetas</strong>: reverse engineering, reversing, java</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2385870" rel="nofollow">noticia original</a> (www.cyberhades.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2385870</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2350478</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>5</meneame:clicks>
		<meneame:votes>1</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>6</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/entrevista-sergio-llata-k-thepope?utm_source=meneame_rss</meneame:url>
		<title>Entrevista a Sergio Llata a.k.a. thEpOpE</title>
		<link>https://www.meneame.net/m/Reverse/entrevista-sergio-llata-k-thepope</link>
		<comments>https://www.meneame.net/m/Reverse/entrevista-sergio-llata-k-thepope</comments>
		<pubDate>Sun, 08 Feb 2015 19:43:29 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[thepope]]></category>
		<category><![CDATA[cracking]]></category>
		<category><![CDATA[cracker]]></category>
		<category><![CDATA[wkt]]></category>
		<category><![CDATA[tnt]]></category>
		<guid>https://www.meneame.net/m/Reverse/entrevista-sergio-llata-k-thepope</guid>
		<description><![CDATA[<p>Con esta entrada, intento recuperar el flujo de entrevistas a personas que de alguna manera, me aportan y hacen crecer en lo técnico y en lo humano. Esta vez, lo haremos de la mano de <b>Sergio Llata</b> (@sergiollata) a.k.a. <b>thEpOpE</b>, fue parte importante en grupos de mucha importancia tales como <b>TNT</b> o <b>WKT</b>.</p><p><strong>etiquetas</strong>: reverse engineering, reversing, thepope, cracking, cracker, wkt, tnt</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2350478" rel="nofollow">noticia original</a> (longinox.blogspot.co.uk)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2350478</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2341850</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>13</meneame:clicks>
		<meneame:votes>3</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>30</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/movimientos-ilimitados-candy-crush-soda-saga?utm_source=meneame_rss</meneame:url>
		<title>Movimientos ilimitados en Candy Crush Soda Saga</title>
		<link>https://www.meneame.net/m/Reverse/movimientos-ilimitados-candy-crush-soda-saga</link>
		<comments>https://www.meneame.net/m/Reverse/movimientos-ilimitados-candy-crush-soda-saga</comments>
		<pubDate>Mon, 26 Jan 2015 19:02:44 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[candy crush]]></category>
		<category><![CDATA[ida]]></category>
		<guid>https://www.meneame.net/m/Reverse/movimientos-ilimitados-candy-crush-soda-saga</guid>
		<description><![CDATA[<p>Hoy vamos a tratar de conseguir movimientos ilimitados en <b>Candy Crush Soda Saga</b>, de King. Para ello iniciamos inspeccionando el <i>APK</i> con <b>Java Decompiler</b>, tras pasarlo por <b>dex2jar</b>.</p><p><strong>etiquetas</strong>: reverse engineering, reversing, candy crush, ida</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2341850" rel="nofollow">noticia original</a> (reversingyourcode.blogspot.com.es)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2341850</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2252841</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>1</meneame:clicks>
		<meneame:votes>2</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>10</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/solucionando-crackmes-precargando-librerias?utm_source=meneame_rss</meneame:url>
		<title>Solucionando crackmes precargando librerías</title>
		<link>https://www.meneame.net/m/Reverse/solucionando-crackmes-precargando-librerias</link>
		<comments>https://www.meneame.net/m/Reverse/solucionando-crackmes-precargando-librerias</comments>
		<pubDate>Wed, 10 Sep 2014 19:46:49 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[ida]]></category>
		<category><![CDATA[crackme]]></category>
		<guid>https://www.meneame.net/m/Reverse/solucionando-crackmes-precargando-librerias</guid>
		<description><![CDATA[<p>Una de las técnicas más utilizadas en sistemas UNIX para analizar o modificar el comportamiento de una aplicación es la de precargar una libreria para hacer que el linker priorize nuestros funciones en vez de las disponibles en librerias externas.</p><p><strong>etiquetas</strong>: reverse engineering, reversing, ida, crackme</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2252841" rel="nofollow">noticia original</a> (www.securitybydefault.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2252841</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2248895</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>1</meneame:clicks>
		<meneame:votes>2</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>10</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/programando-plugins-immunity-debugger?utm_source=meneame_rss</meneame:url>
		<title>Programando plugins para Immunity Debugger</title>
		<link>https://www.meneame.net/m/Reverse/programando-plugins-immunity-debugger</link>
		<comments>https://www.meneame.net/m/Reverse/programando-plugins-immunity-debugger</comments>
		<pubDate>Thu, 04 Sep 2014 13:48:16 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[exploiting]]></category>
		<category><![CDATA[x86]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[immunity]]></category>
		<guid>https://www.meneame.net/m/Reverse/programando-plugins-immunity-debugger</guid>
		<description><![CDATA[<p>Muchas veces, cuando hemos de hacer ingeniería inversa a algún tipo de software o intentar explotarlo, nos damos cuenta de que las herramientas que están a nuestro alcance se ven limitadas debido a uno u otro motivo. Es en estos casos en los que el hecho de saber programar y trabajar con herramientas que se puedan extender fácilmente nos permitirá seguir haciendo nuestro trabajo, a la vez que podemos aportar nuestro granito de arena a la comunidad liberando aquello que desarrollemos.</p><p><strong>etiquetas</strong>: reversing, exploiting, x86, hackers, hacking, immunity</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2248895" rel="nofollow">noticia original</a> (www.securitybydefault.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2248895</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2246252</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>9</meneame:clicks>
		<meneame:votes>1</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>6</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/ebook-gratuito-ingenieria-inversa-principiantes-eng?utm_source=meneame_rss</meneame:url>
		<title>Ebook gratuito: Ingeniería inversa para principiantes [ENG]</title>
		<link>https://www.meneame.net/m/Reverse/ebook-gratuito-ingenieria-inversa-principiantes-eng</link>
		<comments>https://www.meneame.net/m/Reverse/ebook-gratuito-ingenieria-inversa-principiantes-eng</comments>
		<pubDate>Sun, 31 Aug 2014 13:23:26 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[ebook]]></category>
		<category><![CDATA[ingeniería inversa]]></category>
		<guid>https://www.meneame.net/m/Reverse/ebook-gratuito-ingenieria-inversa-principiantes-eng</guid>
		<description><![CDATA[<p><b>Ingeniería inversa</b> para principiantes (en inglés <i>'Reverse Engineering for Beginners'</i>) es un libro gratuito de Dennis Yurichev dirigido a todos aquellos que quieran aprender a entender el código <b>x86</b> (que representa la mayor parte de ejecutables en el mundo del software) y <b>ARM</b> creado por compiladores C/C++.</p><p><strong>etiquetas</strong>: reverse engineering, reversing, ebook, ingeniería inversa</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2246252" rel="nofollow">noticia original</a> (blog.segu-info.com.ar)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2246252</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2246245</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>1</meneame:clicks>
		<meneame:votes>1</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>6</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/introduccion-ingenieria-inversa-software?utm_source=meneame_rss</meneame:url>
		<title>Introducción a la ingeniería inversa de software</title>
		<link>https://www.meneame.net/m/Reverse/introduccion-ingenieria-inversa-software</link>
		<comments>https://www.meneame.net/m/Reverse/introduccion-ingenieria-inversa-software</comments>
		<pubDate>Sun, 31 Aug 2014 13:12:54 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[introduccion]]></category>
		<guid>https://www.meneame.net/m/Reverse/introduccion-ingenieria-inversa-software</guid>
		<description><![CDATA[<p>Para aprender a hacer <b>ingeniería inversa </b>es necesario estar familiarizado con el lenguaje <b>ensamblador</b>,y el uso de un <b>debugger</b>, y sobre todo paciencia y practica mucha practica , si bien no es una tarea imposible suele ser difícil para los principiantes, pues cuando se programa en un lenguaje alto nivel cuando se utilizan sentencias propias del lenguaje, librerías y facilidades se realizan muchas tareas por atrás.</p><p><strong>etiquetas</strong>: reverse engineering, reversing, introduccion</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2246245" rel="nofollow">noticia original</a> (apuntesfcyt.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2246245</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2228684</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>21</meneame:clicks>
		<meneame:votes>3</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>3</meneame:karma>
		<meneame:comments>3</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/herramienta-online-convertir-codigo-hexadecimal-ensamblador?utm_source=meneame_rss</meneame:url>
		<title>Herramienta online para convertir codigo hexadecimal en ensamblador</title>
		<link>https://www.meneame.net/m/Reverse/herramienta-online-convertir-codigo-hexadecimal-ensamblador</link>
		<comments>https://www.meneame.net/m/Reverse/herramienta-online-convertir-codigo-hexadecimal-ensamblador</comments>
		<pubDate>Fri, 01 Aug 2014 20:01:22 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[cenigma]]></category>
		<category><![CDATA[desensamblador]]></category>
		<category><![CDATA[asm]]></category>
		<guid>https://www.meneame.net/m/Reverse/herramienta-online-convertir-codigo-hexadecimal-ensamblador</guid>
		<description><![CDATA[<p>CEnigma is more user-friendly, lighter, faster &amp; backed by Capstone, the most updated disassembly engine available. Thanks to Capstone, 8 architectures are supported: X86, Arm, Arm64, Mips, PowerPC, Sparc, SystemZ &amp; XCore.</p><p><strong>etiquetas</strong>: reverse engineering, reversing, cenigma, desensamblador, asm</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2228684" rel="nofollow">noticia original</a> (www.cenigma.org)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2228684</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2192475</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>23</meneame:clicks>
		<meneame:votes>1</meneame:votes>
		<meneame:negatives>2</meneame:negatives>
		<meneame:karma>-14</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/ida-disassembler-6-6-eng?utm_source=meneame_rss</meneame:url>
		<title>IDA Disassembler 6.6 [ENG]</title>
		<link>https://www.meneame.net/m/Reverse/ida-disassembler-6-6-eng</link>
		<comments>https://www.meneame.net/m/Reverse/ida-disassembler-6-6-eng</comments>
		<pubDate>Thu, 05 Jun 2014 19:27:58 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[ida]]></category>
		<guid>https://www.meneame.net/m/Reverse/ida-disassembler-6-6-eng</guid>
		<description><![CDATA[<p>The IDA Disassembler and debugger is a multi-processor disassembler and debugger hosted on the Windows, Linux and Mac OS X Platforms. It was tough and it required even more research than was planned but finally it arrived. The 64-bit decompiler for x64 code is as simple to use as our other decompilers, and fast as well.</p><p><strong>etiquetas</strong>: reverse engineering, reversing, ida</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2192475" rel="nofollow">noticia original</a> (www.hex-rays.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2192475</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2178190</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>1</meneame:clicks>
		<meneame:votes>1</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>6</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/reversing-direcciones-memoria-variables-segun-path-ejecucion?utm_source=meneame_rss</meneame:url>
		<title>Reversing y direcciones de memoria variables según el path de ejecución</title>
		<link>https://www.meneame.net/m/Reverse/reversing-direcciones-memoria-variables-segun-path-ejecucion</link>
		<comments>https://www.meneame.net/m/Reverse/reversing-direcciones-memoria-variables-segun-path-ejecucion</comments>
		<pubDate>Fri, 16 May 2014 18:31:00 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[ollydbg]]></category>
		<category><![CDATA[metasploit]]></category>
		<category><![CDATA[gdb]]></category>
		<guid>https://www.meneame.net/m/Reverse/reversing-direcciones-memoria-variables-segun-path-ejecucion</guid>
		<description><![CDATA[<p>Llevo tiempo con ganas de profundizar en la creación de módulos de <b>Metasploit</b>, y por fin me decidí a realizar una prueba de concepto orientada a la explotación de una vulnerabilidad detectada realizando reversing de una aplicación en arquitectura <b>x86</b>. El caso es que por el camino encontré una dificultad basada en las <b>rutas de ejecución </b>que me ha parecido interesante comentar como capítulo previo a escribir el módulo de <b>Metasploit</b>.</p><p><strong>etiquetas</strong>: reverse engineering, reversing, ollydbg, metasploit, gdb</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2178190" rel="nofollow">noticia original</a> (www.securitybydefault.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2178190</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2173923</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>4</meneame:clicks>
		<meneame:votes>1</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>6</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/poco-malware-binarios-autoit?utm_source=meneame_rss</meneame:url>
		<title>Un poco de malware y los binarios de Autoit</title>
		<link>https://www.meneame.net/m/Reverse/poco-malware-binarios-autoit</link>
		<comments>https://www.meneame.net/m/Reverse/poco-malware-binarios-autoit</comments>
		<pubDate>Sat, 10 May 2014 13:06:18 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[autoit]]></category>
		<category><![CDATA[ollydbg]]></category>
		<guid>https://www.meneame.net/m/Reverse/poco-malware-binarios-autoit</guid>
		<description><![CDATA[<p>Hace un par de días pasaron por mis manos unos servidores frescos de la botnet <b>Zeus</b>, estos venían cifrados por <b>Crypters</b>. La utilización de <b>Crypters</b> es una práctica muy común para evitar las detecciones antivirus, pero que no solo dificultan este trabajo, sino también el de los <i>reversers</i> que tratan de identificar el tipo de malware que se encuentra detrás del ejecutable cifrado. Servicios como Intelligence de Virustotal ponen a nuestro alcance todo el poder de los patrones <b>YARA</b>.</p><p><strong>etiquetas</strong>: reverse engineering, reversing, malware, autoit, ollydbg</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2173923" rel="nofollow">noticia original</a> (www.enelpc.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2173923</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2161125</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>zoezoe</meneame:user>
		<meneame:clicks>9</meneame:clicks>
		<meneame:votes>3</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>3</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/from-text-to-binary-and-back-again?utm_source=meneame_rss</meneame:url>
		<title>From text to binary and back again</title>
		<link>https://www.meneame.net/m/Reverse/from-text-to-binary-and-back-again</link>
		<comments>https://www.meneame.net/m/Reverse/from-text-to-binary-and-back-again</comments>
		<pubDate>Sat, 19 Apr 2014 19:42:20 +0000</pubDate>
		<dc:creator>zoezoe</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[binario]]></category>
		<category><![CDATA[texto]]></category>
		<category><![CDATA[binary]]></category>
		<category><![CDATA[text]]></category>
		<guid>https://www.meneame.net/m/Reverse/from-text-to-binary-and-back-again</guid>
		<description><![CDATA[<p>¿Alguna vez quisiste enviar un comentario de texto en binario...pero no sabes como hacerlo? Bueno, no busques más. [sic]...&quot;me dolía el cerebro cuando la hice y todavía tengo una ligera resaca&quot;...enjoy it!</p><p><strong>etiquetas</strong>: binario, texto, binary, text</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2161125" rel="nofollow">noticia original</a> (www.roubaixinteractive.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2161125</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2160664</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>5</meneame:clicks>
		<meneame:votes>2</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>10</meneame:karma>
		<meneame:comments>1</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/ropgadget-5-is-out-eng?utm_source=meneame_rss</meneame:url>
		<title>ROPgadget 5.0 is out! [ENG]</title>
		<link>https://www.meneame.net/m/Reverse/ropgadget-5-is-out-eng</link>
		<comments>https://www.meneame.net/m/Reverse/ropgadget-5-is-out-eng</comments>
		<pubDate>Fri, 18 Apr 2014 15:22:43 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[seguridad]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[rop]]></category>
		<category><![CDATA[ropgadget]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[reverse]]></category>
		<guid>https://www.meneame.net/m/Reverse/ropgadget-5-is-out-eng</guid>
		<description><![CDATA[<p>This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF/PE/Mach-O format on x86, x64, ARM, PowerPC, SPARC and MIPS architectures. Since the version 5, ROPgadget has a new core which is written in Python using Capstone disassembly framework for the gadgets search engine. Note that the new version doesn't implement the auto-roper yet! GitHub (v5.0 - 17-04-2014). <a href="https://github.com/JonathanSalwan/ROPgadget/" title="github.com/JonathanSalwan/ROPgadget/" rel="nofollow">github.com/JonathanSalwan/ROPgadget/</a></p><p><strong>etiquetas</strong>: seguridad, hackers, hacking, rop, ropgadget, reversing, reverse</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2160664" rel="nofollow">noticia original</a> (shell-storm.org)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2160664</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2158097</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>1</meneame:clicks>
		<meneame:votes>2</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>13</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/radare-summer-of-code-2014-eng?utm_source=meneame_rss</meneame:url>
		<title>Radare Summer Of Code 2014 [ENG]</title>
		<link>https://www.meneame.net/m/Reverse/radare-summer-of-code-2014-eng</link>
		<comments>https://www.meneame.net/m/Reverse/radare-summer-of-code-2014-eng</comments>
		<pubDate>Mon, 14 Apr 2014 11:38:11 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[seguridad]]></category>
		<category><![CDATA[reverse]]></category>
		<category><![CDATA[radare]]></category>
		<category><![CDATA[x86]]></category>
		<category><![CDATA[ollydbg]]></category>
		<category><![CDATA[asm]]></category>
		<category><![CDATA[ida]]></category>
		<category><![CDATA[windbg]]></category>
		<guid>https://www.meneame.net/m/Reverse/radare-summer-of-code-2014-eng</guid>
		<description><![CDATA[<p>The radare project started in February of 2006 aiming to provide a Free and simple command line interface for an hexadecimal editor supporting 64 bit offsets to make searches and recovering data from hard-disks. Since then, the project has grown with the aim changed to provide a complete framework for analyzing binaries with some basic *NIX concepts in mind like everything is a file, small programs that interact together using stdin/out or keep it simple.</p><p><strong>etiquetas</strong>: reversing, seguridad, reverse, radare, x86, ollydbg, asm, ida, windbg</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2158097" rel="nofollow">noticia original</a> (radare.org)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2158097</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2157682</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>41</meneame:clicks>
		<meneame:votes>3</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>2</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/editor-hexadecimal-online?utm_source=meneame_rss</meneame:url>
		<title>Editor hexadecimal online</title>
		<link>https://www.meneame.net/m/Reverse/editor-hexadecimal-online</link>
		<comments>https://www.meneame.net/m/Reverse/editor-hexadecimal-online</comments>
		<pubDate>Sun, 13 Apr 2014 18:16:44 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[seguridad]]></category>
		<category><![CDATA[reversing]]></category>
		<category><![CDATA[editor]]></category>
		<category><![CDATA[hex]]></category>
		<category><![CDATA[hexadecimal]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<guid>https://www.meneame.net/m/Reverse/editor-hexadecimal-online</guid>
		<description><![CDATA[<p>Editor hexadecimal online</p><p><strong>etiquetas</strong>: seguridad, reversing, editor, hex, hexadecimal, hackers, hacking</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2157682" rel="nofollow">noticia original</a> (hexedit.duttke.de)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2157682</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2150710</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>7</meneame:clicks>
		<meneame:votes>3</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>16</meneame:karma>
		<meneame:comments>1</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/decompilador-x64-casi-listo-eng?utm_source=meneame_rss</meneame:url>
		<title>Decompilador x64 casi listo [ENG]</title>
		<link>https://www.meneame.net/m/Reverse/decompilador-x64-casi-listo-eng</link>
		<comments>https://www.meneame.net/m/Reverse/decompilador-x64-casi-listo-eng</comments>
		<pubDate>Thu, 03 Apr 2014 12:01:56 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[ida]]></category>
		<category><![CDATA[decompilador]]></category>
		<category><![CDATA[hex-rays]]></category>
		<category><![CDATA[x64]]></category>
		<category><![CDATA[x86]]></category>
		<category><![CDATA[asm]]></category>
		<category><![CDATA[ensamblador]]></category>
		<category><![CDATA[debugger]]></category>
		<guid>https://www.meneame.net/m/Reverse/decompilador-x64-casi-listo-eng</guid>
		<description><![CDATA[<p>Ilfak Guilfanov, el creador de IDA Pro, ha anunciado que el famoso decompilador de Hex-Rays esta casi listo para decompilador codigo x64, aunque todavia quedan algunos problemas que resolver.</p><p><strong>etiquetas</strong>: ida, decompilador, hex-rays, x64, x86, asm, ensamblador, debugger</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2150710" rel="nofollow">noticia original</a> (www.hexblog.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2150710</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2149875</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>8</meneame:clicks>
		<meneame:votes>2</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>12</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/reconociendo-bucles-ingenieria-reversa?utm_source=meneame_rss</meneame:url>
		<title>Reconociendo bucles en ingeniería reversa</title>
		<link>https://www.meneame.net/m/Reverse/reconociendo-bucles-ingenieria-reversa</link>
		<comments>https://www.meneame.net/m/Reverse/reconociendo-bucles-ingenieria-reversa</comments>
		<pubDate>Wed, 02 Apr 2014 12:08:23 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[ingeniería reversa]]></category>
		<category><![CDATA[inversa]]></category>
		<category><![CDATA[reverse]]></category>
		<category><![CDATA[ida]]></category>
		<category><![CDATA[asm]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[reversing]]></category>
		<guid>https://www.meneame.net/m/Reverse/reconociendo-bucles-ingenieria-reversa</guid>
		<description><![CDATA[<p>Dado que, al realizar reversing, la cantidad de instrucciones de un programa puede ascender a los cientos de miles, resulta muy poco práctico realizar un análisis instrucción por instrucción. Por eso, se hace necesario lograr cierto nivel de abstracción en el proceso; con un poco de práctica podemos acostumbrarnos a ver un amplio panorama de lo que hace el código, mediante el análisis de grupos de instrucciones en lugar de instrucciones individuales</p><p><strong>etiquetas</strong>: ingeniería reversa, inversa, reverse, ida, asm, malware, reversing</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2149875" rel="nofollow">noticia original</a> (www.welivesecurity.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2149875</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2149472</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>9</meneame:clicks>
		<meneame:votes>2</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>12</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/introduccion-depurador-windows-windbg?utm_source=meneame_rss</meneame:url>
		<title>Introduccion al depurador de Windows WinDbg</title>
		<link>https://www.meneame.net/m/Reverse/introduccion-depurador-windows-windbg</link>
		<comments>https://www.meneame.net/m/Reverse/introduccion-depurador-windows-windbg</comments>
		<pubDate>Wed, 02 Apr 2014 00:32:17 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[windbg]]></category>
		<category><![CDATA[kd]]></category>
		<category><![CDATA[depurador]]></category>
		<category><![CDATA[debugger]]></category>
		<category><![CDATA[reverse engineering]]></category>
		<category><![CDATA[asm]]></category>
		<category><![CDATA[assembler]]></category>
		<guid>https://www.meneame.net/m/Reverse/introduccion-depurador-windows-windbg</guid>
		<description><![CDATA[<p>WinDbg es una aplicación distribuida en la web de Microsoft. Se puede utilizar para depurar en modo de usuario las aplicaciones, los controladores y el sistema operativo en modo kernel. WinDbg se puede utilizar para la depuración de volcados de memoria y también tiene la capacidad de cargar de forma automática lo que se llama 'mapa de símbolos' traduciendo fechas, horas, CRCs haciendo coincidir diversos criterios. Otra de las ventajas es que pueden relacionarse con el código fuente del binario.</p><p><strong>etiquetas</strong>: windbg, kd, depurador, debugger, reverse engineering, asm, assembler</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2149472" rel="nofollow">noticia original</a> (conexioninversa.blogspot.co.uk)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2149472</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2149429</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>6</meneame:clicks>
		<meneame:votes>3</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>16</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/simulador-ensamblador-8-bits?utm_source=meneame_rss</meneame:url>
		<title>Simulador de ensamblador de 8 bits</title>
		<link>https://www.meneame.net/m/Reverse/simulador-ensamblador-8-bits</link>
		<comments>https://www.meneame.net/m/Reverse/simulador-ensamblador-8-bits</comments>
		<pubDate>Tue, 01 Apr 2014 23:21:48 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[ensamblador]]></category>
		<category><![CDATA[assembler]]></category>
		<category><![CDATA[simulador]]></category>
		<category><![CDATA[8 bits]]></category>
		<category><![CDATA[asm]]></category>
		<category><![CDATA[x86]]></category>
		<category><![CDATA[cpu]]></category>
		<guid>https://www.meneame.net/m/Reverse/simulador-ensamblador-8-bits</guid>
		<description><![CDATA[<p>Simulador de ensamblador de 8 bits. Está basado en NASM, provee una sintaxis simplificada y emula el funcionamiento de un procesador x86. La CPU obviamente es de 8 bits y además disponemos de un mapa de memoria de 256 bytes, así como de 4 registros de propósito general. Las instrucciones y los operadores ocupan 1 byte. Como en otras ocasiones, este simulador está escrito en HTML/Javascript, por lo que todo lo que necesitas para jugar con él es un navegador moderno. (ref. <a href="http://www.cyberhades.com/2014/03/28/simulador-de-ensamblador-de-8-bits/" title="www.cyberhades.com/2014/03/28/simulador-de-ensamblador-de-8-bits/" rel="nofollow">www.cyberhades.com/2014/03/28/simulador-de-ensamblador-de-8-bits/</a>)</p><p><strong>etiquetas</strong>: ensamblador, assembler, simulador, 8 bits, asm, x86, cpu</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2149429" rel="nofollow">noticia original</a> (schweigi.github.io)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2149429</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2149428</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>7</meneame:clicks>
		<meneame:votes>2</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>10</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/pyringe-depurador-python?utm_source=meneame_rss</meneame:url>
		<title>Pyringe - Depurador Python</title>
		<link>https://www.meneame.net/m/Reverse/pyringe-depurador-python</link>
		<comments>https://www.meneame.net/m/Reverse/pyringe-depurador-python</comments>
		<pubDate>Tue, 01 Apr 2014 23:15:56 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[depurador]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[debugger]]></category>
		<category><![CDATA[pyringe]]></category>
		<category><![CDATA[gdb]]></category>
		<guid>https://www.meneame.net/m/Reverse/pyringe-depurador-python</guid>
		<description><![CDATA[<p>Pyringe es un depurador (debugger) en Python capaz de adjuntarse a procesos activos, leer su estado e incluso inyectar código python mientras que estos están corriendo. Puedes además listar hilos (threads), rutas (tracebacks), inspeccionar funciones locales, globales, etc.</p><p><strong>etiquetas</strong>: depurador, python, debugger, pyringe, gdb</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2149428" rel="nofollow">noticia original</a> (www.cyberhades.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2149428</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2149395</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>6</meneame:clicks>
		<meneame:votes>1</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>6</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/listado-fuente-ms-dos-eng?utm_source=meneame_rss</meneame:url>
		<title>Listado fuente de MS-DOS [ENG]</title>
		<link>https://www.meneame.net/m/Reverse/listado-fuente-ms-dos-eng</link>
		<comments>https://www.meneame.net/m/Reverse/listado-fuente-ms-dos-eng</comments>
		<pubDate>Tue, 01 Apr 2014 22:16:14 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[msdos]]></category>
		<category><![CDATA[ms-dos]]></category>
		<category><![CDATA[listado]]></category>
		<category><![CDATA[fuente]]></category>
		<category><![CDATA[source]]></category>
		<category><![CDATA[code]]></category>
		<guid>https://www.meneame.net/m/Reverse/listado-fuente-ms-dos-eng</guid>
		<description><![CDATA[<p>Con permiso de Microsoft, el &quot;Computer History Museum&quot; ha liberado el listado fuente de Microsoft DOS v1.1 y v2.0. El archivo zip contiene 4 directorios:   v11source: 7 listados en ensamblador, incluye un email de Tim Paterson con algunas explicaciones.   v11object: 27 ficheros, incluye binarios y programas de ejemplo.   v20source: 118 ficheros de texto, la mayoria codigo en ensamblador y documentacion.   v20object: 38 ficheros, incluye mas binarios y documentacion.</p><p><strong>etiquetas</strong>: msdos, ms-dos, listado, fuente, source, code</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2149395" rel="nofollow">noticia original</a> (www.computerhistory.org)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2149395</wfw:commentRss>	</item>

	<item>
		<meneame:link_id>2149392</meneame:link_id>
		<meneame:sub>Reverse</meneame:sub>
		<meneame:status>queued</meneame:status>
		<meneame:user>TheUglyStranger</meneame:user>
		<meneame:clicks>8</meneame:clicks>
		<meneame:votes>1</meneame:votes>
		<meneame:negatives>0</meneame:negatives>
		<meneame:karma>6</meneame:karma>
		<meneame:comments>0</meneame:comments>
		<meneame:url>https://www.meneame.net/m/Reverse/hackeando-nintendo-3ds-eng?utm_source=meneame_rss</meneame:url>
		<title>Hackeando la Nintendo 3DS [ENG]</title>
		<link>https://www.meneame.net/m/Reverse/hackeando-nintendo-3ds-eng</link>
		<comments>https://www.meneame.net/m/Reverse/hackeando-nintendo-3ds-eng</comments>
		<pubDate>Tue, 01 Apr 2014 22:00:18 +0000</pubDate>
		<dc:creator>TheUglyStranger</dc:creator>
		<category><![CDATA[Reverse]]></category>
		<category><![CDATA[3ds]]></category>
		<category><![CDATA[nintendo]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[hackeando]]></category>
		<guid>https://www.meneame.net/m/Reverse/hackeando-nintendo-3ds-eng</guid>
		<description><![CDATA[<p>Excelente articulo tecnico que explica como conseguir ejecutar codigo en la Nintendo 3DS a partir de un buffer overflow.</p><p><strong>etiquetas</strong>: 3ds, nintendo, hacking, hackeando</p><p>&#187;&nbsp;<a href="http://www.meneame.net/m/Reverse/go?id=2149392" rel="nofollow">noticia original</a> (www.ctnieves.com)</p>]]></description>
		<wfw:commentRss>http://www.meneame.net/m/Reverse/comments_rss?id=2149392</wfw:commentRss>	</item>

</channel>
</rss>
