{"id":1556,"date":"2024-07-27T22:39:28","date_gmt":"2024-07-27T21:39:28","guid":{"rendered":"https:\/\/bitsolto.com\/bitacora\/?p=1556"},"modified":"2024-07-27T22:39:28","modified_gmt":"2024-07-27T21:39:28","slug":"herramientas-de-hacking-etico-1","status":"publish","type":"post","link":"https:\/\/bitsolto.com\/bitacora\/seguridad\/herramientas-de-hacking-etico-1\/","title":{"rendered":"Herramientas de hacking \u00e9tico, 1"},"content":{"rendered":"<p>Para obtener las IP asociadas a un dominio dado de manera \u00e9tica, puedes utilizar varias herramientas y t\u00e9cnicas. Aqu\u00ed te menciono algunas de las m\u00e1s comunes:<\/p>\n<h3>1. <strong>nslookup<\/strong><\/h3>\n<p>Una herramienta de l\u00ednea de comandos disponible en la mayor\u00eda de los sistemas operativos que permite consultar servidores DNS para obtener detalles de dominio.<\/p>\n<pre><code class=\"language-bash\">nslookup example.com<\/code><\/pre>\n<h3>2. <strong>dig<\/strong><\/h3>\n<p>Una herramienta de consulta DNS que proporciona informaci\u00f3n detallada sobre un dominio. Es m\u00e1s avanzada que <code>nslookup<\/code> y se encuentra en sistemas basados en Unix.<\/p>\n<pre><code class=\"language-bash\">dig example.com<\/code><\/pre>\n<h3>3. <strong>whois<\/strong><\/h3>\n<p>Esta herramienta proporciona informaci\u00f3n de registro sobre un dominio, incluidos detalles sobre el propietario, servidores de nombres y m\u00e1s.<\/p>\n<pre><code class=\"language-bash\">whois example.com<\/code><\/pre>\n<h3>4. <strong>ping<\/strong><\/h3>\n<p>Aunque no est\u00e1 dise\u00f1ado espec\u00edficamente para resolver IPs, enviar un ping a un dominio puede devolver su direcci\u00f3n IP.<\/p>\n<pre><code class=\"language-bash\">ping example.com<\/code><\/pre>\n<h3>5. <strong>Traceroute (tracert en Windows)<\/strong><\/h3>\n<p>Esta herramienta rastrea la ruta que toman los paquetes para llegar a un dominio, mostrando las IPs de cada salto.<\/p>\n<pre><code class=\"language-bash\">traceroute example.com<\/code><\/pre>\n<p>o en Windows:<\/p>\n<pre><code class=\"language-bash\">tracert example.com<\/code><\/pre>\n<h3>6. <strong>Nmap<\/strong><\/h3>\n<p>Una herramienta de escaneo de redes que puede realizar una variedad de tareas, incluyendo la resoluci\u00f3n de nombres de dominio a direcciones IP.<\/p>\n<pre><code class=\"language-bash\">nmap -sP example.com<\/code><\/pre>\n<h3>7. <strong>Online Tools<\/strong><\/h3>\n<p>Existen varias herramientas en l\u00ednea que permiten obtener la IP de un dominio, como:<\/p>\n<ul>\n<li><strong>MXToolbox<\/strong>: <a href=\"https:\/\/mxtoolbox.com\/DNSLookup.aspx\">https:\/\/mxtoolbox.com\/DNSLookup.aspx<\/a><\/li>\n<li><strong>DNSstuff<\/strong>: <a href=\"https:\/\/www.dnsstuff.com\/tools\">https:\/\/www.dnsstuff.com\/tools<\/a><\/li>\n<li><strong>IPinfo<\/strong>: <a href=\"https:\/\/ipinfo.io\/\">https:\/\/ipinfo.io\/<\/a><\/li>\n<\/ul>\n<h3>Uso \u00c9tico<\/h3>\n<p>Es fundamental que uses estas herramientas de manera \u00e9tica y legal, respetando las pol\u00edticas y leyes aplicables. Realizar consultas y escaneos sin autorizaci\u00f3n puede considerarse ilegal y violar t\u00e9rminos de servicio.<\/p>\n<p>Si est\u00e1s realizando pruebas de seguridad como parte de una evaluaci\u00f3n autorizada (por ejemplo, en un entorno de pentesting con permiso expl\u00edcito), aseg\u00farate de tener la autorizaci\u00f3n necesaria antes de proceder.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Para obtener las IP asociadas a un dominio dado de manera \u00e9tica, puedes utilizar varias herramientas y t\u00e9cnicas. Aqu\u00ed te menciono algunas de las m\u00e1s comunes: 1. nslookup Una herramienta de l\u00ednea de comandos disponible en la mayor\u00eda de los sistemas operativos que permite consultar servidores DNS para obtener detalles de dominio. nslookup example.com 2. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1453,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","omw_enable_modal_window":"enable","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[68],"tags":[69,70,72,71],"class_list":["post-1556","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","tag-ciberseguridad","tag-hacking-etico","tag-herramientas","tag-seguridad-de-la-informacion","entry","has-media"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/bitsolto.com\/bitacora\/wp-json\/wp\/v2\/posts\/1556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitsolto.com\/bitacora\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitsolto.com\/bitacora\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitsolto.com\/bitacora\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitsolto.com\/bitacora\/wp-json\/wp\/v2\/comments?post=1556"}],"version-history":[{"count":1,"href":"https:\/\/bitsolto.com\/bitacora\/wp-json\/wp\/v2\/posts\/1556\/revisions"}],"predecessor-version":[{"id":1557,"href":"https:\/\/bitsolto.com\/bitacora\/wp-json\/wp\/v2\/posts\/1556\/revisions\/1557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitsolto.com\/bitacora\/wp-json\/wp\/v2\/media\/1453"}],"wp:attachment":[{"href":"https:\/\/bitsolto.com\/bitacora\/wp-json\/wp\/v2\/media?parent=1556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitsolto.com\/bitacora\/wp-json\/wp\/v2\/categories?post=1556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitsolto.com\/bitacora\/wp-json\/wp\/v2\/tags?post=1556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}