?url_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adc&rft.title=T%C3%A9cnicas+y+herramientas+de+an%C3%A1lisis+de+vulnerabilidades+de+una+red&rft.creator=R%C3%ADos+Y%C3%A1guez%2C+Javier&rft.contributor=Estaire+Estaire%2C+Francisco+Javier&rft.subject=Computer+Science&rft.description=El+presente+documento+pretende+ofrecer+una+visi%C3%B3n+general+del+estado+del+conjunto+de+herramientas+disponibles+para+el+an%C3%A1lisis+y+explotaci%C3%B3n+de+vulnerabilidades+en+sistemas+inform%C3%A1ticos+y+m%C3%A1s+concretamente+en+redes+de+ordenadores.%0D%0APor+un+lado+se+ha+procedido+a+describir+anal%C3%ADticamente+el+conjunto+de+herramientas+de+software+libre+que+se+ofrecen+en+la+actualidad+para+analizar+y+detectar+vulnerabilidades+en+sistemas+inform%C3%A1ticos.+Se+ha+descrito+el+funcionamiento%2C+las+opciones%2C+y+la+motivaci%C3%B3n+de+uso+para+dichas+herramientas%2C+compar%C3%A1ndolas+con+otras+en+algunos+casos%2C+describiendo+sus+diferencias+en+otros%2C+y+justificando+su+elecci%C3%B3n+en+todos+ellos.%0D%0APor+otro+lado+se+ha+procedido+a+utilizar+dichas+herramientas+analizadas+con+el+objetivo+de+desarrollar+ejemplos+concretos+de+uso+con+sus+diferentes+par%C3%A1metros+seleccionados+observando+su+comportamiento+y+tratando+de+discernir+qu%C3%A9+datos+son+%C3%BAtiles+para+obtener+informaci%C3%B3n+acerca+de+las+vulnerabilidades+existentes+en+el+sistema.+Adem%C3%A1s%2C+se+ha+desarrollado+un+caso+pr%C3%A1ctico+en+el+que+se+pone+en+pr%C3%A1ctica+el+conocimiento+te%C3%B3rico+presentado+de+forma+que+el+lector+sea+capaz+de+asentar+lo+aprendido+comprobando+mediante+un+caso+real+la+utilidad+de+las+herramientas+descritas.%0D%0ALos+resultados+obtenidos+han+demostrado+que+el+an%C3%A1lisis+y+detecci%C3%B3n+de+vulnerabilidades+por+parte+de+un+administrador+de+sistemas+competente+permite+ofrecer+a+la+organizaci%C3%B3n+en+cuesti%C3%B3n+un+conjunto+de+t%C3%A9cnicas+para+mejorar+su+seguridad+inform%C3%A1tica+y+as%C3%AD+evitar+problemas+con+potenciales+atacantes.%0D%0AABSTRACT.%0D%0AThis+paper+tries+to+provide+an+overview+of+the+features+of+the+set+of+tools+available+for+the+analysis+and+exploitation+of+vulnerabilities+in+computer+systems+and+more+specifically+in+computer+networks.%0D%0AOn+the+one+hand+we+pretend+analytically+describe+the+set+of+free+software+tools+that+are+offered+today+to+analyze+and+detect+vulnerabilities+in+computer+systems.+We+have+described+the+operation%2C+options%2C+and+motivation+to+use+these+tools+in+comparison+with+other+in+some+case%2C+describing+their+differences+in+others%2C+and+justifying+them+in+all+cases.%0D%0AOn+the+other+hand+we+proceeded+to+use+these+analyzed+tools+in+order+to+develop+concrete+examples+of+use+with+different+parameters+selected+by+observing+their+behavior+and+trying+to+discern+what+data+are+useful+for+obtaining+information+on+existing+vulnerabilities+in+the+system.%0D%0AIn+addition%2C+we+have+developed+a+practical+case+in+which+we+put+in+practice+the+theoretical+knowledge+presented+so+that+the+reader+is+able+to+settle+what+has+been+learned+through+a+real+case+verifying+the+usefulness+of+the+tools+previously+described.%0D%0AThe+results+have+shown+that+vulnerabilities+analysis+and+detection+made+by+a+competent+system+administrator+can+provide+to+an+organization+a+set+of+techniques+to+improve+its+systems+and+avoid+any+potential+attacker.&rft.publisher=E.T.S.I+y+Sistemas+de+Telecomunicaci%C3%83%C2%B3n+(UPM)&rft.rights=http%3A%2F%2Fcreativecommons.org%2Flicenses%2Fby-nc-nd%2F3.0%2Fes%2F&rft.date=2014-07-15&rft.type=info%3Aeu-repo%2Fsemantics%2FbachelorThesis&rft.type=Final+Project&rft.type=PeerReviewed&rft.format=application%2Fpdf&rft.language=spa&rft.rights=info%3Aeu-repo%2Fsemantics%2FopenAccess&rft.identifier=http%3A%2F%2Foa.upm.es%2F32786%2F