Completed
Vulnerability Information
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Siphon Project
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Overview
- 3 What is Network Mapping?
- 4 Why is this Important?
- 5 Network Mapping Information
- 6 Port Information
- 7 Operating System Information
- 8 Topology Map Generation
- 9 Vulnerability Information
- 10 Current Mapping Techniques
- 11 Active Network Mapping
- 12 Active Mapping Techniques
- 13 Active Port Mapping
- 14 Active OS Identification
- 15 Active Information Enumeration
- 16 Active Topology Mapping
- 17 Active Vulnerability Assessment
- 18 Pros & Cons of Active Mapping
- 19 The Siphon Project
- 20 Passive Network Mapping
- 21 Is Passive Feasible?
- 22 Siphon Mapping Techniques
- 23 Passive TCP Port Mapping
- 24 TCP Port Mapping Challenges Problem Corruption of information caused by
- 25 Passive UDP Port Mapping
- 26 UDP Port Mapping Challenges
- 27 Passive OS Identification
- 28 Passive OS Ident. Challenges
- 29 Siphon OS Ident. Algorithm
- 30 Passive OS Ident Challenges
- 31 Passive Information Enumeration
- 32 Passive Topology Mapping
- 33 Routing Information Protocol
- 34 Topology Mapping with RIP
- 35 DV to LS Routing Conversion as a Convex Optimization
- 36 DV to LS Conversion Cont.
- 37 DV to LS Conversion Example
- 38 Open Shortest Path First
- 39 Topology Mapping with OSPF
- 40 Passive Vuln. Assessment
- 41 Traffic Analysis
- 42 Example Siphon Report
- 43 Future Features of Siphon