Personally I am a fan of FOCA, it may not get you all the information you seek but it will get you some. I also like Maltego. The only problem I have using Maltego is that you can get into information overload and get lost in what you are looking at very easily. If you are going to use Maltego it is worth a couple hours watching some videos on how others use it.
Doublewood From: [email protected] [mailto:[email protected]] On Behalf Of Carlos A. Lozano Sent: Thursday, February 28, 2013 8:50 AM To: PaulDotCom Security Weekly Mailing List Subject: Re: [Pauldotcom] Network Mapping Software Hi, SolarWinds can be an option, and it's not intrusive using SNMP. Regards. import Android import human class Augusto(body): def __init__(self, personality): self.personality='fool' def eat(tacos): human.eat(tacos) def sex(big_boobs_girl): human.reproduction(big_boobs_girl) def hobby(vuln-dev): human.sports(vuln-dev) def sleep(myvar='-_-zZ...'): human.sleep(myvar) El 28/02/2013 08:34, "Lester Nichols" <[email protected]<mailto:[email protected]>> escribió: The answer is a bit of yes to all the above. Because of the independence of the locations, an invasive scan cannot be done and we cannot "cross" into their LAN per se. But the goal is to obtain information about the environment and associated unauthorized connwction to go back to these groups and get consensus to corect thw issues...it is highly political. On Feb 28, 2013 8:00 AM, "Ron Gula" <[email protected]<mailto:[email protected]>> wrote: Are you concerned with connectivity and routing or do you care about access control? There are tones of great net mapping products out there like Lumeta, but if you really need to see which ports are open between enclaves, you either need to scan or sniff the connection, like with our Tenable solution (distributed Nessus and Passive Vulnerability Scanners), or model the firewall rules with something like RedSeal. If they are a Tenable customer, feel free to ping me offline. This sort of data is collected passively and is pretty easy to report on which enclaves have access to other enclaves based on scan results or sniffed traffic. Ron From: Lester Nichols <[email protected]<mailto:[email protected]>> Reply-To: PaulDotCom List <[email protected]<mailto:[email protected]>> Date: Wednesday, February 27, 2013 9:05 AM To: PaulDotCom List <[email protected]<mailto:[email protected]>> Subject: [Pauldotcom] Network Mapping Software All, Trying to get recommendation on a network mapping software that could help identify unauthorized bridged networks. Ideally this would be something capable to identify divergent LANs across the WAN... Back Story: The unnamed federal agency has 600+ locations with public and private LANs, but each local LAN is not accountable to the other or to other Executive Branch mandates...as such there is a concern that there are unauthorized bridged connection to the local LAN. The need is to be able to identify those potential connection in a non-intrusive way. Any ideas? v/r ---------- Lester E. Nichols III, MSIA, CISSP, GCED, GCFW, GSEC, MCSA, CompTIA Security+ [email protected]<mailto:[email protected]> cuiusvis hominis est erare, nulius nisi insipientis in errore perseverare. http://www.linkedin.com/in/lnichols Information Systems Security Association - General Member Information Systems Audit and Control Association - Member A proud member of the Federal Bureau of Investigation's InfraGard _______________________________________________ Pauldotcom mailing list [email protected]<mailto:[email protected]> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com _______________________________________________ Pauldotcom mailing list [email protected]<mailto:[email protected]> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
