
Python Passive Network Mapping
P2NMAP
Description
Key Features
- First book to show you how to use open source Python to conduct passive network mapping
- Provides a new method for conducting incident response and investigating the extent of potential damage to your systems
- Python code forensics toolkit for network mapping included on the companion website
Readership
Table of Contents
- Dedication
- Biography
- Preface
- Acknowledgments
- Chapter 1: Introduction
- Abstract
- Conventions Used in This Text
- What is Python Passive Network Mapping or P2NMAP?
- Why Does This Method Cast a Larger Net?
- How Can Active Network Mapping Actually Hurt You?
- Organization of the Book
- Review
- Summary Questions
- Chapter 2: What You DON’T Know About Your Network
- Abstract
- What’s Running on Your Network Might Surprise You
- OS Fingerprinting
- What Open Ports or Services Don’t You Know About?
- Who’s Touching Your Network?
- Review
- Summary Questions
- Chapter 3: Capturing Network Packets Using Python
- Abstract
- Setting up a Python Passive Network Mapping Environment
- The Art of the Silent Capture
- Python Source Code
- Review
- Summary Questions
- Chapter 4: Packet Capture Analysis
- Abstract
- Packet Capture Analysis
- Setting up Options for Analysis
- Performing Analysis
- Review
- Summary Questions
- Chapter 5: PCAP Extractor and OS Fingerprinting
- Abstract
- PCAP Extraction
- Passive OS Fingerprinting
- Review
- Summary Questions
- Chapter 6: Future Considerations and Challenge Problems
- Abstract
- Author Observations
- Author Predictions
- Challenge Problems
- More Information
- Subject Index
Product details
- No. of pages: 162
- Language: English
- Copyright: © Syngress 2015
- Published: June 10, 2015
- Imprint: Syngress
- eBook ISBN: 9780128027424
- Paperback ISBN: 9780128027219
About the Author
Chet Hosmer
Chet makes numerous appearances each year to discuss emerging cyber threats including National Public Radio's Kojo Nnamdi show, ABC's Primetime Thursday, NHK Japan and ABC News Australia. He is also a frequent contributor to technical and news stories relating to cyber security and forensics and has been interviewed and quoted by IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com, DFI News and Wired Magazine.
He is the author of three recent Elsevier/Syngress Books: Python Passive Network Mapping: ISBN-13: 978-0128027219, Python Forensics: ISBN-13: 978-0124186767 and Data Hiding which is co/authored with Mike Raggo: ISBN-13: 978-1597497435. Chet delivers keynote and plenary talks on various cyber security related topics around the world each year.
Affiliations and Expertise
Ratings and Reviews
There are currently no reviews for "Python Passive Network Mapping"