Network Mapping
Summary
Purpose
Guiding Questions
Operational Security
Preparation
Outputs
Activities
Footnotes
- 1 [See: Vulnerability Analysis](#vulnerability-analysis)
References and resources for Network Mapping
-
Guide: "10 Techniques for Blindly Mapping Internal Networks"
-
Directory: "Network Forensics Packages and Appliances" (Forensics Wiki)
-
Directory: "Scripts and tools related to Wireshark" (Wireshark Wiki)
-
Resource List: "Wireless Access Guides & Resources" (SAFETAG)
-
List: "Default Password List" (defaultpassword.com)
-
List: "Default Password List" (CIRT.net)
-
List: "Default Password List - 2007" (Phenoelit)
-
Documentation: “Airodump-ng” (Aircrack-ng Wiki)
-
References: "Links, References and Other Learning Materials" (Aircrack-ng Wiki)
-
Project Site: "wifite: automated wireless auditor" (Google code)
-
Source Code: "wifite" (GitHub)
-
Guide: "The Official Nmap Project Guide to Network Discovery and Security Scanning" (Gordon “Fyodor” Lyon)
-
Cheat Sheet: “Part 1: Introduction to Nmap” (Nmap Cheat Sheet: From Discovery to Exploits)
-
Cheat Sheet: “Part 2: Advance Port Scanning with Nmap And Custom Idle Scan” (Nmap Cheat Sheet: From Discovery to Exploits)
-
Cheat Sheet: “Part 3: Gathering Additional Information about Host and Network” (Nmap Cheat Sheet: From Discovery to Exploits)
-
Cheat Sheet: “Part 4” (Nmap Cheat Sheet: From Discovery to Exploits)
-
Cheat Sheet: “Nmap Cheat Sheet” (See-Security Technologies)
-
Overview: “The Purpose of a Graphical Frontend for Nmap” (Zenmap GUI Users' Guide)
-
Guide: “Zenmap GUI Users' Guide” (Zenmap GUI Users' Guide)
-
Guide: “Surfing the Network Topology” (Zenmap GUI Users' Guide)
-
Guide: “Host Detection” (nmap Reference Guide)
Network Mapping Methods:
Network Access:
Network Discovery Methods:
Nmap Scanning: