Penetration Testing mailing list archives

Re: mapping l2 network topology


From: jkowall <jkowall () gmail com>
Date: Fri, 23 Jun 2006 21:47:58 -0400

nlayers can do this, but it does a lot more.  Its designed for
application dependency mapping of applications, servers, and
infrastructure as a whole.  EMC just bought them about 2 weeks ago.

It will give you the dependencies and connections from layer 2 up to layer 7.

Its not cheap at all, but excellent for building a CMDB or strict CM
based feedback loop.




On 6/23/06, Freezer < nt3zer () gmail com> wrote:
> Hi,
> is there any reliable way to detect and map topology of layer 2
> devices on the LAN?
> i think that knowing layer 2 topology could give a clue about
> geographic location of devices.
> presence of swithces broadcasting for instance CDP packets could be
> easily detected using tcpdump, then I think even more switches support
> snmp. but i guess there are plenty of unmanaged 'dumb' devices, which
> could not be discovered so simply.
>
> and even if i find out that devices are on network - how to map topology?
>
> maybe some tricks measuring latency? however, doubt its possible due
> to switches having really low latencies.
>
> Regards,
> Freezer
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
> Choice Award from eWeek. As attacks through web applications continue to rise,
> you need to proactively protect your applications from hackers. Cenzic has the
> most comprehensive solutions to meet your application security penetration
> testing and vulnerability management needs. You have an option to go with a
> managed service (Cenzic ClickToSecure) or an enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
> help you: http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request () cenzic com for details.
> ------------------------------------------------------------------------------
>
>




--

-jk



--

-jk

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: