Problem solve Get help with specific problems with your technologies, process and projects.

How would an 'unwanted visitor' create diagrams of a network identifying security checkpoints?

How would an 'unwanted visitor' create diagrams of a network identifying security checkpoints?
'Unwanted visitors,' or hackers as most people know them, use special tools which allow them to create diagrams of networks and possible checkpoints without much effort. Everything is possible when using the correct tools and this is what makes most hackers well known and popular.

The majority of these people create their own tools and sometimes use existing software with a few custom changes to suite their needs. Recently, I was reading a great title from Steven Branigan named High-tech Crimes Revealed. The author does a great job of placing you in his shoes, explaining in great detail how he managed to help the CIA and FBI uncover some big news stories on hackers. In his book, he clearly mentions how hackers go about obtaining information about their targets, creating maps of all possible checkpoints.

When you read books like these, suddenly you've had hundreds of similar type questions answered, but also have new ones popping up.

I guess the most important thing to remember is that everything is possible using the right tools and having the appropriate level of knowledge!

This was last published in September 2005

Dig Deeper on Network Security Monitoring and Analysis

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.