Completed
Siphon Mapping Techniques
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Siphon Project
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Overview
- 3 What is Network Mapping?
- 4 Why is this Important?
- 5 Network Mapping Information
- 6 Port Information
- 7 Operating System Information
- 8 Topology Map Generation
- 9 Vulnerability Information
- 10 Current Mapping Techniques
- 11 Active Network Mapping
- 12 Active Mapping Techniques
- 13 Active Port Mapping
- 14 Active OS Identification
- 15 Active Information Enumeration
- 16 Active Topology Mapping
- 17 Active Vulnerability Assessment
- 18 Pros & Cons of Active Mapping
- 19 The Siphon Project
- 20 Passive Network Mapping
- 21 Is Passive Feasible?
- 22 Siphon Mapping Techniques
- 23 Passive TCP Port Mapping
- 24 TCP Port Mapping Challenges Problem Corruption of information caused by
- 25 Passive UDP Port Mapping
- 26 UDP Port Mapping Challenges
- 27 Passive OS Identification
- 28 Passive OS Ident. Challenges
- 29 Siphon OS Ident. Algorithm
- 30 Passive OS Ident Challenges
- 31 Passive Information Enumeration
- 32 Passive Topology Mapping
- 33 Routing Information Protocol
- 34 Topology Mapping with RIP
- 35 DV to LS Routing Conversion as a Convex Optimization
- 36 DV to LS Conversion Cont.
- 37 DV to LS Conversion Example
- 38 Open Shortest Path First
- 39 Topology Mapping with OSPF
- 40 Passive Vuln. Assessment
- 41 Traffic Analysis
- 42 Example Siphon Report
- 43 Future Features of Siphon