The Siphon Project

The Siphon Project

Black Hat via YouTube Direct link

Active Network Mapping

11 of 43

11 of 43

Active Network Mapping

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Siphon Project

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Overview
  3. 3 What is Network Mapping?
  4. 4 Why is this Important?
  5. 5 Network Mapping Information
  6. 6 Port Information
  7. 7 Operating System Information
  8. 8 Topology Map Generation
  9. 9 Vulnerability Information
  10. 10 Current Mapping Techniques
  11. 11 Active Network Mapping
  12. 12 Active Mapping Techniques
  13. 13 Active Port Mapping
  14. 14 Active OS Identification
  15. 15 Active Information Enumeration
  16. 16 Active Topology Mapping
  17. 17 Active Vulnerability Assessment
  18. 18 Pros & Cons of Active Mapping
  19. 19 The Siphon Project
  20. 20 Passive Network Mapping
  21. 21 Is Passive Feasible?
  22. 22 Siphon Mapping Techniques
  23. 23 Passive TCP Port Mapping
  24. 24 TCP Port Mapping Challenges Problem Corruption of information caused by
  25. 25 Passive UDP Port Mapping
  26. 26 UDP Port Mapping Challenges
  27. 27 Passive OS Identification
  28. 28 Passive OS Ident. Challenges
  29. 29 Siphon OS Ident. Algorithm
  30. 30 Passive OS Ident Challenges
  31. 31 Passive Information Enumeration
  32. 32 Passive Topology Mapping
  33. 33 Routing Information Protocol
  34. 34 Topology Mapping with RIP
  35. 35 DV to LS Routing Conversion as a Convex Optimization
  36. 36 DV to LS Conversion Cont.
  37. 37 DV to LS Conversion Example
  38. 38 Open Shortest Path First
  39. 39 Topology Mapping with OSPF
  40. 40 Passive Vuln. Assessment
  41. 41 Traffic Analysis
  42. 42 Example Siphon Report
  43. 43 Future Features of Siphon

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.