Friday, 1 February 2013

Unobtrusive Network Mapping



• Web server(s).
• Mail server(s).
• DNS server(s).
• Sub-netting information - This is sometimes obscured.
A simple list of hostnames and IP's can be very revealing about the
topology of a network, and the devices one may expect to find.
Consider a typically secured Internet presence, consisting of:
• Secure gateways.
• Web services.
• FTP services.
• Mail services.
• Secondary security systems, such as IDS.
There are many design characteristics associated with different types of
technology, and by simply examining the host and network
information we have gathered without the targets knowledge, we can
start to speculate on the actual physical network topology involved.

No comments:

Post a Comment