Skip to content

Instantly share code, notes, and snippets.

@nullx5
Last active December 17, 2025 02:20
Show Gist options
  • Select an option

  • Save nullx5/48c8c305089d781f20f66b9ce6918e2d to your computer and use it in GitHub Desktop.

Select an option

Save nullx5/48c8c305089d781f20f66b9ce6918e2d to your computer and use it in GitHub Desktop.

🔥 Filtros Wireshark – detectar escaneo Nmap SYN Scan (hacia tu IP) y Detecta ping y arp a mi maquina:

((tcp.flags.syn == 1 && tcp.flags.ack == 0 && ip.dst == 192.168.100.35) || (icmp && ip.dst == 192.168.100.35) || (arp && arp.dst.proto_ipv4 == 192.168.100.35)) && !(ip.addr == 8.8.8.8)

👀 Tip forense rápido

Después de aplicar el filtro:

  • Statistics → Conversations → TCP
  • Ordena por Packets o Ports
  • Una IP → muchos puertos = escaneo confirmado

Tshark

sudo tshark -i wlp2s0 -Y '((tcp.flags.syn == 1 && tcp.flags.ack == 0 && ip.dst == 192.168.100.35) || (icmp && ip.dst == 192.168.100.35) || (arp && arp.dst.proto_ipv4 == 192.168.100.35)) && !(ip.addr == 8.8.8.8)' \ -w escaneo_detectado.pcapng

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment