An attacker can more easily determine the topology or architecture of a target network by creating a network diagram. The attacker can also determine the locations of firewalls, intrusion detection systems, routers, and other access control devices by using the network diagram to follow the path to the target host within the network. After gaining this knowledge, the attacker can attempt to identify any gaps or weaknesses in these security measures. The attacker can then gain access to the victim's network by taking advantage of these flaws.
The network diagram also helps network administrators to manage their networks. Attackers use network discovery or mapping tools to draw network diagrams of target networks.
TOOLS
TOOLS FOR MOBILE
- Scany, a network scanner app for iPhone and iPad, scans LAN, Wi-Fi networks, websites, and open ports, discovers network devices, and digs network info. It supports several networking protocols and anti-stealth technologies. Attackers can use this programme to check up hostnames, device names, MAC addresses, hardware vendors, ping/trace hosts using built-in tools, and look up IP addresses, ASNs, and WHOIS hostnames. They can also use it to scan a network range or the LAN.
- Network Analyzer, can diagnose various problems in the Wi-Fi network setup or Internet connectivity, and it can also detect various issues in remote servers based on its wide range of in-built tools.
- PortDroid Network Analysis
No comments:
Post a Comment