Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

Asignacion1

Asignación2
https://www.kali.org/tools/nmap/
https://www.educba.com/kali-linux-nmap/
https://nmap.org/
http://codigoprogramacion.com/tag/nmap-hacking#.Y2MK4HYWW_U
https://www.varonis.com/blog/nmap-commands
https://www.upguard.com/blog/how-to-use-nmap
https://www.redeszone.net/tutoriales/configuracion-puertos/nmap-escanear-puertos-
comandos/
Asignación3
https://behacker.pro/que-es-hping3-y-como-escanear-puertos/
https://www.redeszone.net/tutoriales/seguridad/hping3-manipular-paquetes-tcp-ip-
ataques/
https://lamiradadelreplicante.com/2012/01/24/ataque-ddos-syn-flood-con-hping3/
https://www.seguridadx.com/hping3/
https://www.pedrocarrasco.org/manual-practico-de-hping/
https://www.kali.org/tools/hping3/
https://www.ucm.es/pimcd2014-free-software/wireshark#:~:text=Wireshark%20es%20un
%20analizador%20de,aprender%20m%C3%A1s%20sobre%20redes%20inform%C3%A1ticas.
https://openwebinars.net/blog/wireshark-que-es-y-ejemplos-de-uso/
https://vasexperts.com/es/resources/glossary/rtt/
https://www.similaranswer.es/que-es-rst-ack-en-wireshark/#el-rst-ack-es-normal
https://www.quora.com/What-is-the-RST-ACK-packet-in-data-transmission
https://www.reydes.com/d/?q=Entendiendo_el_Esquema_de_Colores_en_Wireshark
https://kali-linux.net/article/hping3/
https://www.welivesecurity.com/la-es/2015/02/02/manipulando-paquetes-hping3/
https://academianet.wordpress.com/2016/11/14/hping3-manual-de-utilizacion-de-esta-
herramienta-para-manipular-paquetes-tcpip/
https://www.revistatransformaciondigital.com/2021/11/18/el-protocolo-simple-
service-discovery-protocol/
https://msrc-blog.microsoft.com/2011/02/16/notes-on-exploitability-of-the-recent-
windows-browser-protocol-issue/
https://osqa-ask.wireshark.org/questions/37630/wireshark-syn-ack-fin-get/
https://www.um.es/docencia/barzana/DIVULGACION/INFORMATICA/Introduccion_a_TCPIP.pdf
https://techyrick.com/hping3-full-tutorial-for-dummies-to-pro/
Asignacion4
https://keepcoding.io/blog/que-es-metasploit-ciberseguridad/#Que_es_Metasploit
https://ciberseguridad.com/herramientas/pruebas-penetracion/metasploit-framework/#
%C2%BFQue_es_Metasploit_Framework
https://www.funinformatique.com/es/cest-quoi-metasploit-et-comment-bien-lutiliser/
https://comandoit.com/como-utilizar-metasploit-con-kali-linux/
https://academia-hacker.com/metasploit-framework/#:~:text=Los%20m%C3%B3dulos
%20auxiliares%20se%20usan,explotar%20vulnerabilidades%20en%20sistemas%20remotos.
https://thehackerway.com/2011/05/01/payloads-basicos-en-metasploit-framework/
https://www.cm-alliance.com/cybersecurity-blog/using-metasploit-and-nmap-to-scan-
for-vulnerabilities
Asignacion LabMod3
https://nmap.org/book/man-target-specification.html
https://www.ionos.es/digitalguide/servidores/know-how/sctp/
https://geek-university.com/discover-hosts-with-a-tcp-syn-ping-scan/
https://nmap.org/book/man-briefoptions.html
Asignacion Lab4
https://www.oreilly.com/library/view/dns-on-windows/0596005628/ch12s06s03.html
https://www.ionos.es/digitalguide/servidores/herramientas/nslookup/#:~:text=Contin
%C3%BAa-,%C2%BFQu%C3%A9%20es%20nslookup%3F,de%20una%20determinada%20direcci%C3%B3n
%20IP).
https://phoenixnap.com/kb/nslookup-command
https://linube.com/ayuda/articulo/287/como-utilizar-el-comando-dig#:~:text=Dig%20es
%20un%20comando%20que,y%20tambi%C3%A9n%20desde%20Mac%20OS.
https://www.youtube.com/watch?v=hdWk1MuNTjo
Asignacion3Mod6
https://www.icm.es/2022/05/06/nmap-analisis-de-puertos-y-monitorizacion-de-redes/
https://es-la.tenable.com/products/nessus
https://hackingymas.com/las-5-mejores-herramientas-de-pentesting-2021/
https://snifer.gitbooks.io/burpsuite/content/intro/whoburpsuite.html
https://cursohackingetico.com/que-es-un-analisis-de-vulnerabilidades/
https://www.redeszone.net/tutoriales/seguridad/mejores-escaner-vulnerabilidades-
gratis-hacker/
https://www.manageengine.com/latam/vulnerability-management/analisis-de-
vulnerabilidades.html
https://repositorio.continental.edu.pe/bitstream/20.500.12394/9560/4/
IV_FIN_103_TI_Palacios_Gallardo_2021.pdf
https://www.seaq.co/nessus.html
https://keepcoding.io/blog/que-es-nessus/
https://fferia.wordpress.com/nessus/
Practica1
https://support.sequentum.com/hc/en-us/articles/360017895654-Web-Data-Extraction-
Limitations
www.imagar.com
http://www.insectraforensics.com/
https://www.solvetic.com/
https://sstechnologyglobal.com/web-data-extraction/
Asignacin2Mod5
https://www.proofpoint.com/es/threat-reference/ddos
https://www.cs.upc.edu/~gabriel/files/DEA-es-2DOS-DDOS.pdf
https://powerdmarc.com/es/dos-vs-ddos-attacks/
https://blog.sarenet.es/ataque-de-denegacion-de-servicio/
https://www.ovhcloud.com/es/security/anti-ddos/ddos-definition/
https://www.stackscale.com/es/blog/ataques-ddos/#:~:text=Algunos%20de%20los
%20ejemplos%20m%C3%A1s,un%20ataque%20de%20inundaci%C3%B3n%20HTTP.
https://www.osi.es/es/actualidad/blog/2018/08/21/que-son-los-ataques-dos-y-ddos
https://www.redeszone.net/tutoriales/seguridad/tipos-ataques-ddos-proteger-web/
https://linube.com/blog/ataque-ddos-y-ataque-dos/
https://www.incibe-cert.es/blog/clasificacion-ataques-dos
https://www.icm.es/2020/09/29/ddos-dos/

You might also like