enlaces:utilidades_de_red
Diferencias
Muestra las diferencias entre dos versiones de la página.
Ambos lados, revisión anteriorRevisión previaPróxima revisión | Revisión previa | ||
enlaces:utilidades_de_red [2011/06/29 19:41] – [Python Proxy] cayu | enlaces:utilidades_de_red [2019/01/22 15:34] (actual) – [Parser y formateador de salida NMap] cayu | ||
---|---|---|---|
Línea 2: | Línea 2: | ||
===== Conectividad ===== | ===== Conectividad ===== | ||
+ | |||
+ | ==== Agregar ruta estatica ==== | ||
+ | |||
+ | < | ||
+ | ip route add 192.168.55.0/ | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | route add -net 192.168.55.0 netmask 255.255.255.0 gw 192.168.1.254 dev eth1 | ||
+ | </ | ||
==== Forzar el modo ethernet ==== | ==== Forzar el modo ethernet ==== | ||
Línea 10: | Línea 20: | ||
ethtool -s eth0 speed 100 duplex full autoneg off | ethtool -s eth0 speed 100 duplex full autoneg off | ||
</ | </ | ||
- | |||
==== Conectarse a redes Wi Fi ==== | ==== Conectarse a redes Wi Fi ==== | ||
Primero bajamos el servicio de Network Manager si es que lo tenemos instalado | Primero bajamos el servicio de Network Manager si es que lo tenemos instalado | ||
Línea 339: | Línea 348: | ||
http:// | http:// | ||
- | |||
- | ==== Network Grep - ngrep ==== | ||
- | |||
- | Muestra y busca paquetes. Ngrep se esfuerza por proveer de la mayoría de características comunes del " | ||
- | |||
- | |||
- | http:// | ||
- | |||
- | |||
- | Un posteo interesante en un blog : http:// | ||
- | |||
Línea 415: | Línea 413: | ||
- | ==== Netcat ==== | ||
- | | ||
- | It is designed to be a reliable " | ||
- | It provides access to the following main features: | + | ==== Python Proxy ==== |
- | * Outbound and inbound connections, | + | Mini Proxy en Python |
- | * Featured tunneling mode which allows also special tunneling such as UDP to TCP, with the possibility of specifying all network parameters (source port/ | + | |
- | * Built-in port-scanning capabilities, | + | |
- | * Advanced usage options, such as buffered send-mode (one line every N seconds), and hexdump (to stderr or to a specified file) of trasmitted and received data. | + | |
- | * Optional RFC854 telnet codes parser and responder. | + | |
- | + | ||
- | + | ||
- | The GNU Netcat is distributed freely under the GNU General Public License (GPL). | + | |
- | + | ||
- | <code bash> | + | |
- | echo -e "GET / HTTP/ | + | |
- | </ | + | |
- | + | ||
- | Referencias : | + | |
- | + | ||
- | http:// | + | |
- | + | ||
- | + | ||
- | Tutorial con ejemplos prácticos : http:// | + | |
- | + | ||
- | ==== Python | + | |
http:// | http:// | ||
Línea 453: | Línea 428: | ||
GET http:// | GET http:// | ||
</ | </ | ||
+ | |||
==== Parser y formateador de salida NMap ==== | ==== Parser y formateador de salida NMap ==== | ||
- | Algo muy útil a la hora de hacer reporte de servidores en base a un archivo de lista de servidores, ej nmap-report.pl servidores.txt, | + | Algo muy útil a la hora de hacer reporte de servidores en base a un archivo de lista de servidores, ej nmap-report.pl servidores.txt, |
<code perl> | <code perl> | ||
Línea 465: | Línea 441: | ||
if ( $@ ) { | if ( $@ ) { | ||
warn "Error to load module: Nmap:: | warn "Error to load module: Nmap:: | ||
- | . " | + | . " |
- | . " | + | |
. " | . " | ||
exit (); | exit (); | ||
Línea 473: | Línea 448: | ||
use POSIX qw(strftime); | use POSIX qw(strftime); | ||
- | $hora= strftime(" | ||
- | |||
my $scanner = new Nmap:: | my $scanner = new Nmap:: | ||
$scanner-> | $scanner-> | ||
Línea 481: | Línea 454: | ||
$scanner-> | $scanner-> | ||
my $lista = $ARGV[0]; | my $lista = $ARGV[0]; | ||
- | my $file = $ARGV[1]; | ||
my $opciones_scan = "-sS -A -vv -p0-65535 -sV -O -iL $lista"; | my $opciones_scan = "-sS -A -vv -p0-65535 -sV -O -iL $lista"; | ||
- | $antes = time(); | ||
print " | print " | ||
- | print "$lista\n"; | + | print "^^Puerto^Estado^Servicio^Informacion^^\n"; |
$scanner-> | $scanner-> | ||
sub scan_started { | sub scan_started { | ||
- | |||
my $self = shift; | my $self = shift; | ||
my $host = shift; | my $host = shift; | ||
Línea 495: | Línea 465: | ||
$addresses = join(',', | $addresses = join(',', | ||
my $status = $host-> | my $status = $host-> | ||
- | + | # print " | |
- | print " | + | |
} | } | ||
sub port_found { | sub port_found { | ||
- | |||
my $self = shift; | my $self = shift; | ||
my $host = shift; | my $host = shift; | ||
Línea 507: | Línea 475: | ||
my $name = $host-> | my $name = $host-> | ||
my $puerto = $port-> | my $puerto = $port-> | ||
- | if ($puerto eq " | + | if ($puerto eq " |
- | elsif($puerto eq " | + | elsif($puerto eq " |
my $proto= $port-> | my $proto= $port-> | ||
if ($proto eq " | if ($proto eq " | ||
- | elsif($proto eq " | + | elsif($proto eq " |
- | my $salida_puerto = join(''," | + | my $salida_puerto = join(''," |
print " | print " | ||
} | } | ||
sub scan_complete { | sub scan_complete { | ||
- | |||
my $self = shift; | my $self = shift; | ||
my $host = shift; | my $host = shift; | ||
no warnings; | no warnings; | ||
- | print "Host Descripcion: | ||
for my $match ($host-> | for my $match ($host-> | ||
- | print F "Host could be of type: " . $match-> | + | print "\n\n\nHost determinado aproximadamente: " . $match-> |
} | } | ||
for my $c ($host-> | for my $c ($host-> | ||
- | | + | # |
- | print "- OS generation: " . $c-> | + | print "- OS generation: " . $c-> |
- | print "- OS family: | + | print "- OS family: |
- | print "- OS Type: " | + | print "- OS Type: " |
} | } | ||
- | |||
} | } | ||
</ | </ | ||
+ | |||
+ | ==== hping3 ==== | ||
+ | **hping3** is a free packet generator and analyzer for the TCP/IP protocol. Hping is one of the de-facto tools for security auditing and testing of firewalls and networks, and was used to exploit the Idle Scan scanning technique now implemented in the Nmap port scanner. The new version of hping, hping3, is scriptable using the Tcl language and implements an engine for string based, human readable description of TCP/IP packets, so that the programmer can write scripts related to low level TCP/IP packet manipulation and analysis in a very short time. | ||
+ | |||
+ | Like most tools used in computer security, hping3 is useful to security experts. | ||
+ | |||
+ | hping3 should be used to… *Traceroute/ | ||
+ | |||
+ | == Few commands == | ||
+ | Finding Hping3 | ||
+ | < | ||
+ | hping3 –h | ||
+ | </ | ||
+ | hping3 Default | ||
+ | < | ||
+ | hping3 -S 192.168.1.105 -p 80 | ||
+ | </ | ||
+ | Fragment Packets with hping3 | ||
+ | < | ||
+ | hping3 -f 192.168.1.105 -p 80 | ||
+ | </ | ||
+ | Sending Data with hping3 | ||
+ | < | ||
+ | hping3 -f 192.168.1.105 -p 80 -d 10 -E malware | ||
+ | </ | ||
+ | Traceroute with hping3 | ||
+ | < | ||
+ | hping3 -z -t 1 -S google.com -p 80 | ||
+ | </ | ||
+ | Predicting Sequence Numbers with hping3 | ||
+ | < | ||
+ | hping3 -Q -S google.com -p 80 | ||
+ | </ | ||
+ | hping3 for Uptime | ||
+ | < | ||
+ | hping3 --tcp-timestamp -S google.com -p 80 | ||
+ | </ | ||
+ | |||
+ | Ref.: @cyberhawksecurity | ||
+ |
enlaces/utilidades_de_red.1309376487.txt.gz · Última modificación: 2011/06/29 19:41 por cayu