Network Recon Simulator

Train your eye to spot network vulnerabilities. Realistic scenarios with WiGLE wireless data and Shodan scans. Find the weak points.

All Training →

Each scenario presents you with wireless survey data from WiGLE and internet scan results from Shodan. Your job is to analyze both datasets and identify the vulnerabilities.

The WiGLE tab shows discovered wireless networks with SSIDs, MAC addresses, encryption types, and hardware vendors. Look for open networks, naming patterns that reveal internal structure, and vendor information that might indicate default credentials.

The Shodan tab shows internet-facing devices with IPs, open ports, and service banners. Old software versions, cleartext protocols like Telnet and FTP, and exposed IoT devices are common findings.

After reviewing both datasets, complete the vulnerability checklist. Identify whether an open WiFi network exists, whether any devices run vulnerable services, whether sensitive IoT is exposed, and what the most promising attack vector would be.

Scenarios include corporate headquarters, stadiums, warehouses, and financial campuses.