⚔️
Carpa Security Book
  • 😎Introduction
  • 🔴Offensive Security
    • Reconnaissance & Information Gathering
      • Passive Reconnaissance
        • Reconnaissance Frameworks
        • Metadata Analysis
        • Domain & IP Enumeration
        • Social Media
        • Email Addresses
        • Search Engines
      • Active Recon
        • System & Network
          • Network & Port Scanning
          • Vulnerability Scanners
          • OS Fingerprinting & Service Identification
          • Network Mapping and Visualization
          • Service Enumeration
        • Web Application
          • Public Resource
          • Technology Mapping
          • Analyzing Client Side Code
          • Testing User Inputs and Controls:
          • Analyzing Server Responses and Error Messages:
          • API and Endpoint Analysis:
          • Session Management Analysis
          • Automated Vulnerability Scanning
          • Web Enumeration
        • Wireless Network Reconnaissance
    • Exploitation & Target Compromise
    • Privilege Escalation
    • Post Exploitation
      • Lateral Movement
    • Attacktive Directory
    • Credential Attacks
    • Wireless
    • Social Engineering
    • Web App PenTesting
    • Physical Security
  • 🔵Defensive Security
  • 🖥️Linux Commands
  • 🔠Certificates Prep
  • 🔗Training and Resources
Powered by GitBook
On this page
  1. Offensive Security
  2. Reconnaissance & Information Gathering
  3. Active Recon
  4. System & Network

Network Mapping and Visualization

PreviousOS Fingerprinting & Service IdentificationNextService Enumeration

Last updated 1 year ago

In active reconnaissance, Network Mapping and Visualization involve creating a visual representation of the network's structure, including devices, connections, and topology. This process helps in identifying key nodes, network boundaries, and potential areas of vulnerability. OS Fingerprinting and Service Identification are crucial components of this process. They involve determining the operating system and services running on each networked device, which helps in identifying vulnerabilities specific to those systems or services.

Network Mapping and Visualization Tools

Zenmap: is the official graphical user interface for Nmap, providing a user-friendly way to perform network discovery and security auditing. It offers interactive and intuitive visualization of scan results, the ability to save and compare scans, and advanced scanning options.

: is an IT Asset Management tool that scans networks to discover and inventory network assets. It provides detailed information about hardware and software, integrates with help desk solutions, and offers various reporting tools.

: is a network scanning tool known for its fast and accurate network discovery capabilities. The tool is available for mobile and desktop platforms and offers features like Wi-Fi analysis, Internet outage detection, and intruder alerts.

Network Mapper (Android Nmap App): An Android version of Nmap, offering its features on mobile devices. Ideal for quick scans and network audits from mobile devices, with most of the functionality of desktop Nmap.

The Dude: is a network management application by MikroTik which can improve the way you manage your network environment. It automatically scans all devices within specified subnets, maps the networks, monitors services, and alerts you to problems.

🔴
LanSweeper
Fing