The Impact of Passive Network Mapping in Distributed Environments

Presented at DEF CON 8 (2000), July 30, 2000, 3 p.m. (50 minutes).

This new approach to information gathering is the latest in stealth target aquisition technology. This lecture will discuss dynamic routing protocol internals, network mapping methodology, vulnerability analysis techniques, and OS identification procedures. Come prepared for an in-depth compare / contrast session between active and passive network information gathering heuristics. We make informed target aquisition notoriously fun and difficult to detect. The portable tool to do this will be released on Sunday afternoon.


Presenters:

  • Subterrain Security Group (SSG)
    Subterrain Security Group releases solid, portable, and freely available open source tools for performing computer and network security related tasks.

Links: