O'Reilly logo

Python Passive Network Mapping by Chet Hosmer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

What You DON’T Know About Your Network

Abstract

This chapter examines devices and services that may be running on your network. Using tcpdump we examine and try to make sense of captured network activity in promiscuous mode. I also introduce the first Python script to perform a targeted promiscuous capture. The script attempts to make sense of which IP address (source or destination) is the client vs server and the script also extracts useful information that can be used for OS Fingerprinting. The chapter also introduces the concept of deductive and inductive reasoning and considers other applications of passive network mapping.

Keywords

DMZ
VPN
Firewall
Application Firewall
DLP
SEIM
Maginot
detect
protect
react
wearable technology ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required