LEADER 05140nam 2200673 450 001 9910818992203321 005 20200520144314.0 010 $a0-12-802742-8 010 $a0-12-802721-5 035 $a(CKB)3710000000422593 035 $a(EBL)2068785 035 $a(SSID)ssj0001540142 035 $a(PQKBManifestationID)11849141 035 $a(PQKBTitleCode)TC0001540142 035 $a(PQKBWorkID)11533747 035 $a(PQKB)10083398 035 $a(Au-PeEL)EBL2068785 035 $a(CaPaEBR)ebr11064650 035 $a(CaONFJC)MIL798693 035 $a(OCoLC)911032843 035 $a(CaSebORM)9780128027424 035 $a(MiAaPQ)EBC2068785 035 $a(PPN)19866575X 035 $a(EXLCZ)993710000000422593 100 $a20150622h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPython passive network mapping $eP2NMAP /$fChet Hosmer ; technical editor Gary C. Kessler 205 $a1st edition 210 1$aWaltham, Massachusetts :$cSyngress,$d2015. 210 4$dİ2015 215 $a1 online resource (162 p.) 300 $aDescription based upon print version of record. 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aCover; Title Page; Copyright Page; Dedication; Contents; Biography; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions and Contributions; Acknowledgments; Chapter 1 - Introduction; Conventions Used in This Text; So What is a Ping Anyway?; What is Python Passive Network Mapping or P2NMAP?; Why Does This Method Cast a Larger Net?; How Can Active Network Mapping Actually Hurt You?; Organization of the Book; Review; Summary Questions; References; Chapter 2 - What You DON'T Know About Your Network 327 $aWhat's Running on Your Network Might Surprise YouBig vs. Little; We Care About What's Running on Our Systems; Why Do We Care?; A Quick Demonstration; How to Do This in Python?; Sample Program Output; OS Fingerprinting; OS Fingerprinting Using TCP/IP Default Header Values; OS Fingerprinting Using Open Port Patterns; What Open Ports or Services Don't You Know About?; How is This Useful?; Who's Touching Your Network?; Review; Summary Questions; Additional Resources; Chapter 3 - Capturing Network Packets Using Python; Setting up a Python Passive Network Mapping Environment 327 $aSwitch Configuration for Packet Capture Computing Resources; Storing Captured Data; Storing the Captured Packets - Python Dictionaries; IP Observation Dictionary Class; OS Observation Dictionary Class; The Art of the Silent Capture; Python Source Code; Command Line Entry and Execution of P2NMAP-Capture.py; Review; Summary Questions; Additional Resource; Chapter 4 - Packet Capture Analysis; Packet Capture Analysis; Setting up Options for Analysis; Loading an Observation File; Direct Program Output; Specifying the Host Lookup Option; Specifying the Country Lookup Option; Performing Analysis 327 $aPrinting Observations All Printing the Observed Servers; Printing the Observed Clients; Printing the Observed Server to Client Connections; Printing a Histogram of Observations; Final P2NMAP-Analysis Script Complete Source Code; Review; Summary Questions; Additional Resource; Chapter 5 - PCAP Extractor and OS Fingerprinting; PCAP Extraction; Review of P2NMAP-Capture; Utilizing the dptk Package; P2NMAP-PCAP-Extractor.py Script; Executing P2NMAP-PCAP-Extractor; Passive OS Fingerprinting; OS Fingerprinting Truth Table; Truth Table Python Class; P2NMAP-OS-Fingerprint Script 327 $aExecuting P2NMAP-OS-FingerprintReview; Summary Questions; Additional Resources; Chapter 6 - Future Considerations and Challenge Problems; Author Observations; Author Predictions; Challenge Problems; More Information; Subject Index 330 $aPython Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The ""Heartbleed"" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most important 606 $aComputer networks$xSecurity measures 606 $aPython (Computer program language) 606 $aPeer-to-peer architecture (Computer networks) 615 0$aComputer networks$xSecurity measures. 615 0$aPython (Computer program language) 615 0$aPeer-to-peer architecture (Computer networks) 676 $a005.8 700 $aHosmer$b Chet$0865893 702 $aKessler$b Gary C. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910818992203321 996 $aPython passive network mapping$94099191 997 $aUNINA