Network Recon
Back to Training
Network Recon Simulator
OPERATOR:
--
Mission Briefing
Operation:
Target Area:
Intel Requirement:
Reference Guide
WiGLE Data
SSID:
Network names reveal structure
Open:
Primary attack vector
WEP:
Obsolete, easily cracked
Vendor:
Research default creds
Shodan Data
Banners:
Reveal software versions
Port 21/23:
FTP/Telnet (cleartext)
IoT:
Often poorly secured
WiGLE Scan
Shodan Results
Wi-Fi networks detected in target area.
Internet-facing devices in target IP range.
Vulnerability Checklist
1. Open (unencrypted) Wi-Fi network identified?
Yes
No
2. Device with vulnerable service (Telnet, FTP) discovered?
Yes
No
3. Sensitive IoT device (camera, ICS) identified?
Yes
No
4. Most promising attack vector?
Select...
Open Wi-Fi network
Default credentials on exposed device
Outdated vulnerable service
No obvious vector
New Scenario
Submit Report
Debrief