<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://miguelangel.torresegea.es/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://miguelangel.torresegea.es/wiki/feed.php">
        <title>miguel angel torres egea</title>
        <description></description>
        <link>https://miguelangel.torresegea.es/wiki/</link>
        <image rdf:resource="https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png" />
       <dc:date>2026-05-23T17:12:19+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/linux:tcpip:dns?rev=1767009585&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/linux:tcpip:dig?rev=1556648584&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/linux:tcpip:nmap?rev=1689772815&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/linux:tcpip:iptables?rev=1587317855&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/linux:tcpip:nfs?rev=1628965242&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/linux:tcpip:rutas?rev=1478863072&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/linux:tcpip:ips?rev=1779445769&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/linux:tcpip:netplan?rev=1639738671&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/linux:tcpip:netcat?rev=1321351182&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/linux:tcpip:start?rev=1718614899&amp;do=diff"/>
                <rdf:li rdf:resource="https://miguelangel.torresegea.es/wiki/linux:tcpip:nikto2?rev=1329212031&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png">
        <title>miguel angel torres egea</title>
        <link>https://miguelangel.torresegea.es/wiki/</link>
        <url>https://miguelangel.torresegea.es/wiki/_media/wiki:dokuwiki-128.png</url>
    </image>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/linux:tcpip:dns?rev=1767009585&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-12-29T11:59:45+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>DNS</title>
        <link>https://miguelangel.torresegea.es/wiki/linux:tcpip:dns?rev=1767009585&amp;do=diff</link>
        <description>DNS

linux tcpip dns

related

	*  DNS y funcionamiento
	*  DNS: Resolución, progagación, limpieza
	*  dnsmasq
	*  bind9
	*  127.0.0.1 VS 127.0.1.1
	*  &lt;https://www.dns0.eu/&gt;
	*  &lt;https://one.one.one.one/&gt;

direct

	*  esbrinar qui gestiona les dades de xarxa (netplan)
	*  aplicar els canvis (networkmanager en desktops)

DNS populars

	*  Cloudflare DNS (1.1.1.1, 1.0.0.1)
	*  OpenDNS (208.67.222.222, 208.67.220.220)</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/linux:tcpip:dig?rev=1556648584&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-04-30T18:23:04+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>dig</title>
        <link>https://miguelangel.torresegea.es/wiki/linux:tcpip:dig?rev=1556648584&amp;do=diff</link>
        <description>dig

linux tcpip

related

secciones

	*  cabecera : opciones generales e informativas
	*  question section : petición lanzada al DNS
	*  answer section : respuesta del servidor a la petición
	*  authority section: que servidor DNS tiene autoridad para responder a la petición</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/linux:tcpip:nmap?rev=1689772815&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-07-19T13:20:15+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>nmap</title>
        <link>https://miguelangel.torresegea.es/wiki/linux:tcpip:nmap?rev=1689772815&amp;do=diff</link>
        <description>nmap

parámetros

	*  -sS : escanea los puertos más normales o los difinidos en services
	*  -p  : escanea un puerto determinado (50), un rango (50-60) o todos, poniendo un guión (-p-)
	*  -Tx : establece el periodo de tiempo que deja pasar para escanear un dispositovo para evitar ser detectado y que el firewall nos mande información falsa. De más espaciado a menos:</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/linux:tcpip:iptables?rev=1587317855&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-04-19T17:37:35+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>iptables</title>
        <link>https://miguelangel.torresegea.es/wiki/linux:tcpip:iptables?rev=1587317855&amp;do=diff</link>
        <description>iptables

uso

mantener las conexiones ya establecidas, incluso conmigo mismo:

# iptables -A INPUT -m commtrack --ctstate RELATED,ESTABLISHED -j ACCEPT

# iptables -A INPUT -s 127.0.0.1 -j ACCEPT

descartar todos los paquetes entrantes:

# iptables -P INPUT DROP</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/linux:tcpip:nfs?rev=1628965242&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-08-14T18:20:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>NFS</title>
        <link>https://miguelangel.torresegea.es/wiki/linux:tcpip:nfs?rev=1628965242&amp;do=diff</link>
        <description>NFS

información

	*  &lt;http://es.tldp.org/Manuales-LuCAS/GARL2/garl2/x-087-2-nfs.html&gt;
	*  mount -t nfs nfs_volume local_dir options (se puede omitir -t nfs pq el formato de montaje es exclusivo de este protocolo)
		*  mount -t nfs vlager:/home /users

	*  cat /proc/filesystems -&gt; ha de aparecer «nfs»

puesta en marcha de server/client</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/linux:tcpip:rutas?rev=1478863072&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-11-11T11:17:52+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>rutas</title>
        <link>https://miguelangel.torresegea.es/wiki/linux:tcpip:rutas?rev=1478863072&amp;do=diff</link>
        <description>rutas

manual temporal

$ ip route show

# ip route add 10.8.0.0/24 via 192.168.1.50 dev eth0

manual fijo


allow-hotplug eth0
iface eth0 inet static
  address 192.168.1.4        # este es mi caso
  netmask 255.255.255.0
  network 192.168.1.0
  broadcast 192.168.1.255
  gateway 192.168.1.1

### static routing ###
# añade una ruta a la red 10.0.0.0/8 a través del Gateway 10.9.38.65
  post-up route add -net 10.0.0.0 netmask 255.0.0.0 gw 10.9.38.65
  pre-down route del -net 10.0.0.0 netmask 255.0.…</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/linux:tcpip:ips?rev=1779445769&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-22T10:29:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ip</title>
        <link>https://miguelangel.torresegea.es/wiki/linux:tcpip:ips?rev=1779445769&amp;do=diff</link>
        <description>ip

comandos

mi ip local

ip addr show eth0 | grep &#039;inet &#039; | awk &#039;{print $2}&#039; | cut -f1 -d&#039;/&#039;
ip addr show

	*  ifconfig -a
	*  ip addr (ip a)
	*  hostname -I | awk &#039;{print $1}&#039;
	*  ip route get 1.2.3.4 | awk &#039;{print $7}&#039;
	*  (Fedora) Wifi-Settings→ click the setting icon next to the Wifi name that you are connected to → Ipv4 and Ipv6 both can be seen</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/linux:tcpip:netplan?rev=1639738671&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-12-17T10:57:51+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>netplan (ubunut network)</title>
        <link>https://miguelangel.torresegea.es/wiki/linux:tcpip:netplan?rev=1639738671&amp;do=diff</link>
        <description>netplan (ubunut network)

Ubuntu 18.04 LTS has switched to Netplan for configuring network interfaces. Netplan is based on YAML based configuration system that makes configuration process very simple. Netplan has replaced the old configuration file /etc/network/interfaces that we previously used for configuring network interfaces in Ubuntu.</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/linux:tcpip:netcat?rev=1321351182&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2011-11-15T09:59:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>netcat (nc)</title>
        <link>https://miguelangel.torresegea.es/wiki/linux:tcpip:netcat?rev=1321351182&amp;do=diff</link>
        <description>netcat (nc)

este comando no requiere privilegios ROOT

comandos de ejemplo

scan TCP en rango puertos: 

nc -z systemadmin.es 70-90

scan UDP en rango puertos: 

nc -zu systemadmin.es 50-55</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/linux:tcpip:start?rev=1718614899&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-06-17T09:01:39+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>tcp/ip (on Linux)</title>
        <link>https://miguelangel.torresegea.es/wiki/linux:tcpip:start?rev=1718614899&amp;do=diff</link>
        <description>tcp/ip (on Linux)

información

	*  cat /etc/services
	*  &lt;https://wiki.debian.org/es/NetworkConfiguration&gt;
	*  VLAN: &lt;https://nosololinux.es/todo-lo-que-necesitas-saber-sobre-vlans-en-redes/&gt;

configuración

	*  ip
	*  DNS
	*  dhcp
	*  rutas
	*  NFS

utilidades

	*  dig
	*  whois
	*  ss
	*  netstat

firewall

	*  iptables
	*  Uncomplicated Firewall

comandos

	*  averiguar servidores DNS en conexto DHCP:
# averiguar ubicación fichero .lease
ps aux | grep dhclient
cat /var/lib/NetworkManager/dhc…</description>
    </item>
    <item rdf:about="https://miguelangel.torresegea.es/wiki/linux:tcpip:nikto2?rev=1329212031&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-02-14T09:33:51+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Escaner de vulnerabilidades nikto2</title>
        <link>https://miguelangel.torresegea.es/wiki/linux:tcpip:nikto2?rev=1329212031&amp;do=diff</link>
        <description>Escaner de vulnerabilidades nikto2

descarga

$ wget &lt;https://cirt.net/nikto/nikto-2.1.4.tar.gz&gt; --no-check-certificate

ejecución

parámetros:

	*  -h : host a escanear
	*  -port: puerto a escanear, por defecto el 80

ejemplo de salida


#./nikto.pl -h cau.eurocity.es
- Nikto v2.1.4
---------------------------------------------------------------------------
+ Target IP:          192.168.3.164
+ Target Hostname:    cau.eurocity.es
+ Target Port:        80
+ Start Time:         2012-02-15 09:34:1…</description>
    </item>
</rdf:RDF>
