Herramientas de red

A continuación, se detallan algunas herramientas para Linux imprescindibles para explorar redes y obtener información acerca de servicios y vulnerabilidades.

fping

ping múltiple. Por ejemplo:

fping -s -g 172.16.0.1 172.16.0.50
172.16.0.1 is alive
172.16.0.2 is alive
172.16.0.4 is alive
172.16.0.6 is alive
ICMP Host Unreachable from ...
ICMP Host Unreachable from ...
ICMP Host Unreachable from ...
...
...

50 targets
4 alive
46 unreachable
0 unknown addresses
184 timeouts (waiting for response)
188 ICMP Echos sent
4 ICMP Echo Replies received
174 other ICMP received
0.24 ms (min round trip time)
2.46 ms (avg round trip time)
7.62 ms (max round trip time)
8.400 sec (elapsed real time)

nmap

Explora redes y escanea puertos. Por ejemplo:

nmap -p1-65535 172.16.0.2
Starting Nmap 4.53 ( http://insecure.org ) at 2008-04-07
Interesting ports on 172.16.0.2:
Not shown: 65532 filtered ports
PORT     STATE  SERVICE
80/tcp   open   http
3306/tcp open   mysql
8080/tcp open   http-proxy
Nmap done: 1 IP address (1 host up) scanned in 143.208 seconds

nbtscan

busca en la red nombres NetBios. Por ejemplo:

nbtscan -r 172.16.0.0/16
Doing NBT name scan for addresses from 172.16.0.0/16
IP address NetBIOS Name Server    User      MAC address
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
172.16.0.4 PC1          <server>  <unknown> 00:11:df:a0:ad:9b
172.16.0.6 <unknown>    <unknown>
172.16.0.2 PC2          <server>  <unknown> 00:11:8d:ba:d0:6a

Vía: Linux-OS

Tags: , , , ,


Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.