Python Passive Network Mapping
- Authors
- Hosmer, Chet
- Publisher
- Syngress Publishing
- Tags
- python , programming
- Date
- 2015-07-09T00:00:00+00:00
- Size
- 21.32 MB
- Lang
- en
"Python Passive Network Mapping: P2NMAP" is the first book to reveal a
revolutionary and open source method for exposing nefarious network activity.
The "Heartbleed" vulnerability has revealed significant weaknesses within
enterprise environments related to the lack of a definitive mapping of network
assets. In "Python Passive Network Mapping," Chet Hosmer shows you how to
effectively and definitively passively map networks. Active or probing methods
to network mapping have traditionally been used, but they have many drawbacks
\- they can disrupt operations, crash systems, and - most importantly - miss
critical nefarious activity. You require an accurate picture of the
environments you protect and operate in order to rapidly investigate,
mitigate, and then recover from these new attack vectors. This book gives you
a deep understanding of new innovations to passive network mapping, while
delivering open source Python-based tools that can be put into practice
immediately.
"Python Passive Network Mapping "is for practitioners, forensic investigators,
IT teams, and individuals who work together when performing incident response
and investigating potential damage, or are examining the impacts of new
malware threats. Those defending critical infrastructures will have a special
interest inthis book, as active or probing methods of network mapping are
rarely used within these environments as any resulting impacts can be
disastrous. "Python Passive Network Mapping "is ideally suited for use as a
text in a variety of academic programs to expose and engage students in the
art of passively mapping enterprise networks, with the added benefit of
providing exposure to open source Python solutions.
First book to show you how to use open source Python to conduct passive
network mappingProvides a new method for conducting incident response and
investigating the extent of potential damage to your systemsPython code
forensics toolkit for network mapping included on the companion website"