
{"id":329,"date":"2008-03-25T10:44:51","date_gmt":"2008-03-25T13:44:51","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=329"},"modified":"2008-03-25T10:44:51","modified_gmt":"2008-03-25T13:44:51","slug":"nstx-ip-over-dns-e-icmptx-ip-over-icmp","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/","title":{"rendered":"NSTX (IP-over-DNS) e ICMPTX (IP-over-ICMP)"},"content":{"rendered":"<p>NSTX est\u00c3\u00a1 bastante en boga \u00c3\u00baltimamente, ya que est\u00c3\u00a1 siendo utilizado activamente para obtener acceso inal\u00c3\u00a1mbrico gratu\u00c3\u00adto en conectividades que normalmente son de pago, especialmente en aeropuertos, hoteles con <em>gateways<\/em> de pago, etc. Cuando el carrier admite tr\u00c3\u00a1fico DNS, es posible tunelizar IP sobre servidores de nombres. Esta tunelizaci\u00c3\u00b3n se conoce como NSTX, y consiste en encapsular paquetes IP en peticiones DNS.En caso de que el carrier no admita tr\u00c3\u00a1fico DNS, podemos probar a <a href=\"http:\/\/thomer.com\/icmptx\/\">establecer un t\u00c3\u00banel ping<\/a>, consistente en establecer conexiones TCP empleando eco ICMP y paquetes de respuesta. Este m\u00c3\u00a9todo se denomina ICMPTX.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.hackszine.com\/blog\/archive\/pingtunnel_20070205.jpg\" alt=\"ping tunnel\" \/><\/p>\n<p>Ten\u00c3\u00a9is m\u00c3\u00a1s informaci\u00c3\u00b3n en los siguientes enlaces:<\/p>\n<p><a href=\"http:\/\/thomer.com\/howtos\/nstx.html\">http:\/\/thomer.com\/howtos\/nstx.html<\/a><br \/>\n<a href=\"http:\/\/thomer.com\/icmptx\/\">http:\/\/thomer.com\/icmptx\/<\/a><br \/>\n<a href=\"http:\/\/blog.folksonomy.com\/?p=240\">http:\/\/blog.folksonomy.com\/?p=240<\/a><br \/>\n<a href=\"http:\/\/www.hackszine.com\/blog\/archive\/2007\/02\/bypass_pay_wifi_with_ping_tunn.html\">http:\/\/www.hackszine.com\/blog\/archive\/2007\/02\/bypass_pay_wifi_with_ping_tunn.html <\/a><\/p>\n<p>Fuente: http:\/\/www.sahw.com\/wp\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NSTX est\u00c3\u00a1 bastante en boga \u00c3\u00baltimamente, ya que est\u00c3\u00a1 siendo utilizado activamente para obtener acceso inal\u00c3\u00a1mbrico gratu\u00c3\u00adto en conectividades que normalmente son de pago, especialmente en aeropuertos, hoteles con gateways de pago, etc. Cuando el carrier admite tr\u00c3\u00a1fico DNS, es posible tunelizar IP sobre servidores de nombres. Esta tunelizaci\u00c3\u00b3n se conoce como NSTX, y consiste [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-329","post","type-post","status-publish","format-standard","hentry","category-articulos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - NSTX (IP-over-DNS) e ICMPTX (IP-over-ICMP)<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"NSTX (IP-over-DNS) e ICMPTX (IP-over-ICMP)\",\"datePublished\":\"2008-03-25T13:44:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/\"},\"wordCount\":152,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.hackszine.com\/blog\/archive\/pingtunnel_20070205.jpg\",\"articleSection\":[\"Art\u00c3\u00adculos\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - NSTX (IP-over-DNS) e ICMPTX (IP-over-ICMP)\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.hackszine.com\/blog\/archive\/pingtunnel_20070205.jpg\",\"datePublished\":\"2008-03-25T13:44:51+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/#primaryimage\",\"url\":\"http:\/\/www.hackszine.com\/blog\/archive\/pingtunnel_20070205.jpg\",\"contentUrl\":\"http:\/\/www.hackszine.com\/blog\/archive\/pingtunnel_20070205.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - NSTX (IP-over-DNS) e ICMPTX (IP-over-ICMP)","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"NSTX (IP-over-DNS) e ICMPTX (IP-over-ICMP)","datePublished":"2008-03-25T13:44:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/"},"wordCount":152,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/#primaryimage"},"thumbnailUrl":"http:\/\/www.hackszine.com\/blog\/archive\/pingtunnel_20070205.jpg","articleSection":["Art\u00c3\u00adculos"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/","url":"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - NSTX (IP-over-DNS) e ICMPTX (IP-over-ICMP)","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/#primaryimage"},"thumbnailUrl":"http:\/\/www.hackszine.com\/blog\/archive\/pingtunnel_20070205.jpg","datePublished":"2008-03-25T13:44:51+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/nstx-ip-over-dns-e-icmptx-ip-over-icmp\/#primaryimage","url":"http:\/\/www.hackszine.com\/blog\/archive\/pingtunnel_20070205.jpg","contentUrl":"http:\/\/www.hackszine.com\/blog\/archive\/pingtunnel_20070205.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=329"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/329\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}