CompTIA PenTest+
1 Threats, Attacks, and Vulnerabilities
1-1 Common Threat Actors
1-2 Threat Intelligence Sources
1-3 Threat Actors and Motives
1-4 Threat Actor Tactics, Techniques, and Procedures (TTPs)
1-5 Vulnerability Types
1-6 Exploit Types
1-7 Attack Types
1-8 Threat Detection and Monitoring
1-9 Threat Hunting
1-10 Incident Response
2 Architecture and Design
2-1 Security Controls
2-2 Network Architecture
2-3 Cloud and Virtualization
2-4 Web Application Security
2-5 Wireless Security
2-6 Mobile Security
2-7 IoT Security
2-8 Industrial Control Systems (ICS) Security
2-9 Physical Security
2-10 Secure Software Development
3 Tools and Code
3-1 Penetration Testing Tools
3-2 Exploitation Tools
3-3 Post-Exploitation Tools
3-4 Reporting Tools
3-5 Scripting and Automation
3-6 Programming Languages
3-7 Code Analysis
3-8 Open Source Intelligence (OSINT) Tools
4 Planning and Scoping
4-1 Penetration Testing Methodologies
4-2 Legal and Compliance Considerations
4-3 Scope Definition
4-4 Risk Assessment
4-5 Threat Modeling
4-6 Information Gathering
4-7 Asset Identification
4-8 Data Classification
4-9 Business Impact Analysis
4-10 Penetration Testing Objectives
5 Information Gathering and Vulnerability Identification
5-1 Passive Reconnaissance
5-2 Active Reconnaissance
5-3 Vulnerability Scanning
5-4 Network Mapping
5-5 Service Identification
5-6 Web Application Scanning
5-7 Wireless Network Scanning
5-8 Social Engineering Techniques
5-9 OSINT Techniques
5-10 Vulnerability Databases
6 Attacks and Exploits
6-1 Exploit Development
6-2 Buffer Overflows
6-3 SQL Injection
6-4 Cross-Site Scripting (XSS)
6-5 Cross-Site Request Forgery (CSRF)
6-6 Command Injection
6-7 Privilege Escalation
6-8 Lateral Movement
6-9 Evasion Techniques
6-10 Exploit Delivery Methods
7 Penetration Testing Process
7-1 Pre-Engagement Activities
7-2 Reconnaissance
7-3 Scanning and Enumeration
7-4 Exploitation
7-5 Post-Exploitation
7-6 Reporting
7-7 Remediation
7-8 Retesting
7-9 Documentation and Evidence Collection
7-10 Communication and Coordination
8 Reporting and Communication
8-1 Report Structure
8-2 Executive Summary
8-3 Technical Findings
8-4 Risk Assessment
8-5 Remediation Recommendations
8-6 Legal and Compliance Considerations
8-7 Presentation Skills
8-8 Communication with Stakeholders
8-9 Documentation Standards
8-10 Continuous Improvement
9 Security and Compliance
9-1 Regulatory Requirements
9-2 Industry Standards
9-3 Compliance Audits
9-4 Data Protection
9-5 Privacy Laws
9-6 Incident Response Planning
9-7 Disaster Recovery Planning
9-8 Business Continuity Planning
9-9 Risk Management
9-10 Security Awareness Training
5.4 Network Mapping Explained

5.4 Network Mapping Explained

Key Concepts

1. Network Discovery

Network Discovery is the process of identifying devices, services, and their configurations on a network. This involves using tools and techniques to gather information about the network topology, IP addresses, and open ports.

Example: Using Nmap to scan a network and identify all active hosts, their operating systems, and open ports.

2. Network Topology

Network Topology refers to the arrangement of various elements (links, nodes, etc.) in a network. It provides a visual representation of how devices are connected and how data flows between them.

Example: A star topology where all devices are connected to a central hub, or a mesh topology where devices are interconnected with multiple direct links.

3. IP Address Management

IP Address Management (IPAM) involves the administration of IP addresses within a network. This includes assigning, tracking, and maintaining IP addresses to ensure efficient and conflict-free network operations.

Example: Using an IPAM tool to automatically assign IP addresses to new devices and track their usage across the network.

4. Network Mapping Tools

Network Mapping Tools are software applications designed to discover, map, and monitor network devices and their connections. These tools help in visualizing the network and identifying potential issues.

Example: Using tools like SolarWinds Network Topology Mapper or Nagios to create detailed network maps and monitor device status in real-time.

5. Passive vs. Active Network Mapping

Passive Network Mapping involves gathering information without sending packets to the network. This is done by monitoring network traffic. Active Network Mapping, on the other hand, involves sending packets to discover devices and services.

Example: Passive mapping using a network tap to capture and analyze traffic without affecting the network. Active mapping using tools like Nmap to send probes and gather detailed information.

Examples and Analogies

Consider a city's infrastructure as an analogy for network mapping:

1. Network Discovery: Similar to a city planner using GPS and surveys to identify all buildings, roads, and utilities.

2. Network Topology: The city's layout, such as a grid system for streets or a central hub for public transportation, is analogous to network topology.

3. IP Address Management: Managing street addresses and ensuring no duplicates or conflicts, similar to IPAM in a network.

4. Network Mapping Tools: Tools like GIS (Geographic Information System) used by city planners to create detailed maps and monitor infrastructure.

5. Passive vs. Active Network Mapping: Passive mapping is like observing traffic patterns from a bridge, while active mapping is like sending out survey teams to gather detailed information about each street and building.

By understanding and applying these network mapping concepts, network administrators can effectively visualize, manage, and optimize their network infrastructure.