{"id":2143,"date":"2025-07-09T23:18:56","date_gmt":"2025-07-09T23:18:56","guid":{"rendered":"https:\/\/dsantana.uas.edu.mx\/?p=2143"},"modified":"2025-08-13T15:10:24","modified_gmt":"2025-08-13T15:10:24","slug":"manual-de-comandos-nmap","status":"publish","type":"post","link":"https:\/\/dsantana.uas.edu.mx\/index.php\/2025\/07\/09\/manual-de-comandos-nmap\/","title":{"rendered":"\ud83e\udded Manual de Comandos Nmap"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\"><\/h1>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"696\" height=\"390\" src=\"https:\/\/dsantana.uas.edu.mx\/wp-content\/uploads\/2025\/07\/nmap.png\" alt=\"\" class=\"wp-image-2144\" srcset=\"https:\/\/dsantana.uas.edu.mx\/wp-content\/uploads\/2025\/07\/nmap.png 696w, https:\/\/dsantana.uas.edu.mx\/wp-content\/uploads\/2025\/07\/nmap-300x168.png 300w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">1. Introducci\u00f3n<\/h2>\n\n\n\n<p>Nmap (Network Mapper) es una herramienta de c\u00f3digo abierto para escaneo de redes y auditor\u00eda de seguridad. Permite descubrir hosts, servicios, sistemas operativos y vulnerabilidades en una red.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Comandos B\u00e1sicos<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap 192.168.1.1<\/code>\u00a0\u2014 Escaneo b\u00e1sico de un host.<\/li>\n\n\n\n<li><code>nmap 192.168.1.1-10<\/code>\u00a0\u2014 Escaneo de un rango de IPs.<\/li>\n\n\n\n<li><code>nmap -p 22,80,443 192.168.1.1<\/code>\u00a0\u2014 Escaneo de puertos espec\u00edficos.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">3. Comandos Avanzados<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -O 192.168.1.1<\/code>\u00a0\u2014 Detecci\u00f3n de sistema operativo.<\/li>\n\n\n\n<li><code>nmap -sV 192.168.1.1<\/code>\u00a0\u2014 Detecci\u00f3n de versiones de servicios.<\/li>\n\n\n\n<li><code>nmap -A 192.168.1.1<\/code>\u00a0\u2014 Escaneo agresivo.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">4. Uso de Scripts NSE<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap --script vuln 192.168.1.1<\/code>\u00a0\u2014 Detecci\u00f3n de vulnerabilidades.<\/li>\n\n\n\n<li><code>nmap --script auth 192.168.1.1<\/code>\u00a0\u2014 Scripts de autenticaci\u00f3n.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">5. Escaneo de Firewall\/IDS<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -sS 192.168.1.1<\/code>\u00a0\u2014 Escaneo SYN (stealth scan).<\/li>\n\n\n\n<li><code>nmap -sA 192.168.1.1<\/code>\u00a0\u2014 Escaneo ACK para detectar reglas de firewall.<\/li>\n\n\n\n<li><code>nmap -sN 192.168.1.1<\/code>\u00a0\u2014 Escaneo TCP Null para evadir detecci\u00f3n.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">6. T\u00e9cnicas de Evasi\u00f3n<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -D RND:10 192.168.1.1<\/code>\u00a0\u2014 Uso de direcciones IP se\u00f1uelo.<\/li>\n\n\n\n<li><code>nmap -f 192.168.1.1<\/code>\u00a0\u2014 Fragmentaci\u00f3n de paquetes.<\/li>\n\n\n\n<li><code>nmap --data-length 50 192.168.1.1<\/code>\u00a0\u2014 A\u00f1adir datos aleatorios al paquete.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">7. Formatos de Salida<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>nmap -oN salida.txt 192.168.1.1<\/code>\u00a0\u2014 Salida normal a archivo.<\/li>\n\n\n\n<li><code>nmap -oX salida.xml 192.168.1.1<\/code>\u00a0\u2014 Salida en XML.<\/li>\n\n\n\n<li><code>nmap -oG salida.gnmap 192.168.1.1<\/code>\u00a0\u2014 Salida en formato grepable.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">8. Integraci\u00f3n con otras herramientas<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Zenmap<\/strong>: Interfaz gr\u00e1fica para Nmap.<\/li>\n\n\n\n<li><strong>Metasploit<\/strong>: Importaci\u00f3n de resultados de Nmap para explotaci\u00f3n.<\/li>\n\n\n\n<li><strong>Vulners NSE<\/strong>:\u00a0<code>nmap --script vulners 192.168.1.1<\/code>\u00a0para integraci\u00f3n con base de datos de vulnerabilidades.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">9. Enlaces \u00fatiles<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/nmap.org\/book\/man.html\" target=\"_blank\" rel=\"noreferrer noopener\">Gu\u00eda oficial de Nmap<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/nmap.org\/nsedoc\/\" target=\"_blank\" rel=\"noreferrer noopener\">Documentaci\u00f3n de scripts NSE<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/nmap\/nmap\" target=\"_blank\" rel=\"noreferrer noopener\">Repositorio oficial en GitHub<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">10. Tabla Resumen<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>Comando<\/th><th>Descripci\u00f3n<\/th><\/tr><tr><td><code>nmap -sS<\/code><\/td><td>Escaneo SYN (sigiloso)<\/td><\/tr><tr><td><code>nmap -O<\/code><\/td><td>Detecci\u00f3n de sistema operativo<\/td><\/tr><tr><td><code>nmap -sV<\/code><\/td><td>Detecci\u00f3n de versiones de servicios<\/td><\/tr><tr><td><code>nmap -A<\/code><\/td><td>Escaneo agresivo<\/td><\/tr><tr><td><code>nmap --script vuln<\/code><\/td><td>Detecci\u00f3n de vulnerabilidades<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>1. Introducci\u00f3n Nmap (Network Mapper) es una herramienta de c\u00f3digo abierto para escaneo de redes y auditor\u00eda de seguridad. Permite descubrir hosts, servicios, sistemas operativos y vulnerabilidades en una red. 2. Comandos B\u00e1sicos 3. Comandos Avanzados 4. Uso de Scripts NSE 5. Escaneo de Firewall\/IDS 6. T\u00e9cnicas de Evasi\u00f3n 7. Formatos de Salida 8. Integraci\u00f3n con otras herramientas 9. Enlaces \u00fatiles 10. Tabla Resumen Comando Descripci\u00f3n nmap -sS Escaneo SYN (sigiloso) nmap -O Detecci\u00f3n de sistema operativo nmap -sV Detecci\u00f3n de versiones de servicios nmap -A Escaneo agresivo nmap &#8211;script vuln Detecci\u00f3n de vulnerabilidades<\/p>\n","protected":false},"author":1,"featured_media":2144,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,11,87,10,6],"tags":[],"class_list":["post-2143","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-docencia","category-microsoft","category-seguridad-talleres","category-sistemas-operativos","category-talleres"],"_links":{"self":[{"href":"https:\/\/dsantana.uas.edu.mx\/index.php\/wp-json\/wp\/v2\/posts\/2143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dsantana.uas.edu.mx\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dsantana.uas.edu.mx\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dsantana.uas.edu.mx\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dsantana.uas.edu.mx\/index.php\/wp-json\/wp\/v2\/comments?post=2143"}],"version-history":[{"count":2,"href":"https:\/\/dsantana.uas.edu.mx\/index.php\/wp-json\/wp\/v2\/posts\/2143\/revisions"}],"predecessor-version":[{"id":2161,"href":"https:\/\/dsantana.uas.edu.mx\/index.php\/wp-json\/wp\/v2\/posts\/2143\/revisions\/2161"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dsantana.uas.edu.mx\/index.php\/wp-json\/wp\/v2\/media\/2144"}],"wp:attachment":[{"href":"https:\/\/dsantana.uas.edu.mx\/index.php\/wp-json\/wp\/v2\/media?parent=2143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dsantana.uas.edu.mx\/index.php\/wp-json\/wp\/v2\/categories?post=2143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dsantana.uas.edu.mx\/index.php\/wp-json\/wp\/v2\/tags?post=2143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}