Python Passive Network Mapping
eBook - ePub

Python Passive Network Mapping

P2NMAP

  1. 162 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Python Passive Network Mapping

P2NMAP

Book details
Book preview
Table of contents
Citations

About This Book

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity.

The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately.

Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest inthis book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.

  • First book to show you how to use open source Python to conduct passive network mapping
  • Provides a new method for conducting incident response and investigating the extent of potential damage to your systems
  • Python code forensics toolkit for network mapping included on the companion website

Frequently asked questions

Simply head over to the account section in settings and click on ā€œCancel Subscriptionā€ - itā€™s as simple as that. After you cancel, your membership will stay active for the remainder of the time youā€™ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlegoā€™s features. The only differences are the price and subscription period: With the annual plan youā€™ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weā€™ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Python Passive Network Mapping by Chet Hosmer in PDF and/or ePUB format, as well as other popular books in Computer Science & Programming Languages. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Syngress
Year
2015
ISBN
9780128027424
Chapter 1

Introduction

Abstract

This chapter provides an overview of traditional and passive network mapping. The chapter introduces the concept of Python Passive Network Mapping (P2NMAP) and examines the pros and cons of such an approach. The chapter also examines some of the dangers and pitfalls of active network scanning, especially in critical infrastructure based environments.

Keywords

Python
Passive
Network
Mapping
Nmap
Zenmap
ping
icmp
tcpdump
echo
reply
ā€œMeasure what is measurable, and make measurable what is not so.ā€
Galileo Galilei

Conventions Used in This Text

I use standard typographical conventions (bold, italics, etc.), to highlight text that stands out from the overall body of the paragraph. The font styles I will be using throughout the text are:
Italic
Used for file and directory names and to emphasize terms
Constant width
Used for code listings and script generated output
Constant Width and Bold
Used for user input
Enterprise Networks today are complex, difficult to investigate, require specialized tools and demand exceptional and expert skills in order to properly respond to incidents. When dealing with incidents that involve critical infrastructure or other regulated industry environments the specialization of the toolkits can indeed be daunting.
One of the first challenges that face incident response teams and forensic investigation units is ā€œWhat does your network consist of and how is it configured?ā€ This may seem like a simple question that is easily answered by the Information Technology group. However, when responding to incidents like Heartbleed, Operation Shady Rat, and breaches at major retailers, the technical information and details regarding the network map can be vital.
More specific questions may also include:
ā–Ŗ What internet protocol (IP) addresses and subnets do you operate?
ā–Ŗ What servers and end points are running?
ā–Ŗ Are the Servers local, hosted at an external site or in the cloud?
ā–Ŗ What Operating Systems are in use? What versions and are they up-to-date?
ā–Ŗ What Services (open ports) are available on each server and host?
ā–Ŗ What applications and databases are in use?
ā–Ŗ How is your network configured, protected and isolated?
ā–Ŗ What connections are allowed between servers, hosts and Internet users?
ā–Ŗ Wh...

Table of contents

  1. Cover
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Biography
  7. Preface
  8. Acknowledgments
  9. Chapter 1: Introduction
  10. Chapter 2: What You DONā€™T Know About Your Network
  11. Chapter 3: Capturing Network Packets Using Python
  12. Chapter 4: Packet Capture Analysis
  13. Chapter 5: PCAP Extractor and OS Fingerprinting
  14. Chapter 6: Future Considerations and Challenge Problems
  15. Subject Index