Professional Documents
Culture Documents
Seguridad en Sistemas Operativos: Investigación
Seguridad en Sistemas Operativos: Investigación
Investigación
Index
Index..........................................................................................................................1
Introduction..............................................................................................................2
Porpuse.....................................................................................................................2
Network Mapper (Nmap).........................................................................................3
Requirements for using nmap............................................................................3
What kind of information can be obtained from the scans?...........................3
How can I prevent prevent scans on my computer?.......................................3
Scanning my computer.......................................................................................4
References................................................................................................................6
Conclusión...............................................................................................................6
1|Página
Introduction
The importance of the security of our devices is increasingly heard among us and therefore, people
are increasingly interested in knowing how to protect themselves from the various attacks that exist
today in our environment, so in this document we will know in a basic way that is Network Mapper
better known as Nmap, which shows us information and how to protect ourselves against attacks of
this type.
Porpuse
It will be understood as nmap
The requirements to use this tool will be understood
You will know what kind of information this tool can give us
Finally, some measures will be taken to protect us from this type of scan.
2|Página
Network Mapper (Nmap)
It is a free open source tool for vulnerability scanning and network detection.
Network administrators use Nmap to identify which devices are running on their systems, discover
available hosts and the services they offer, find open ports and detect security risks.
It is designed to scan networks, although its most interesting use is to scan a simple host, through
specially formed IP packets. Nmap allows you to determine if a host is available on the network,
what services it offers (including application name and version), what operating system it runs, what
type of firewall is in use, and many more features. This article tries to demonstrate just these most
basic uses.
Port Knowledge
Basic knowledge of networks
Knowledge of services
Operating Systems Knowledge
Firewall Knowledge
Personally, I consider this research given this knowledge in order to understand the basics of nmap.
Modifying the default TTL value to avoid knowledge of the Operating System
3|Página
Scanning my computer
Hare 5 escaneos a mi computadora:
2. Port Scan
3. Scan Services
4|Página
4. Vulnerability scan
5|Página
References
https://www.marindelafuente.com.ar/que-es-nmap-por-que-necesitas-este-mapeador-de-
red/
https://www.linuxito.com/seguridad/913-escaneos-basicos-con-nmap
https://conocimientolibre.wordpress.com/2007/06/30/nmap-a-fondo-escaneo-de-redes-y-
hosts/
https://www.franciscosepulveda.eu/2012/07/27/otros-tipos-de-escaneo-con-nmap/
https://losindestructibles.wordpress.com/2011/04/15/ataque-con-nmap-y-como-evitarlo/
https://www.securityartwork.es/2012/05/22/defensas-contra-nmap/
Conclusión
Es importante el conocimiento de las herramientas que los atacantes utilizan para así podernos
defender de ellos además de que existen muchas debilidades en nuestras maquinas, es cuestión
de ir aprendiendo poco a poco como es que se aprovechan de ellas los atacantes, en nmap
también hay varias formas de escaneos como por ejemplo los ataques silenciosos o los que no
dejan huellas.
6|Página