Passive Python Network Mapping (P2NMAP)

Book Overview 

P2NMAP_COVERPassive Python Network Mapping – P2NMAP takes a detailed look into the use of pure Python source code to assist in mapping networks.  The book walks the reader through step by step examples of exactly how to do this with explanations of virtually every line of source code.  Limited use of 3rd party Python libraries was a conscious decision to ensure cross platform operation and to expose the details of the capture and analysis processes. The goal was to provide a solid starting point for the expansion of this open source project by others and to be included in academic endeavors.  With some previous exposure to Python or access to one of the many introductory Python language books available even those new to Python or programming in general should be able to digest the material in this text..

P2NMAP is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats passive python methods are a must. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous.

P2NMAP is an ideal resource  suited for use in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.

Where to Buy the Book

P2NMAP is published by Syngress and Elseiver company and is available directly  from the publisher or Amazon.  ISBN:0128027215

Download the Source Code

The P2NMAP source code is provided for those purchasing the book and wishing to dive right into the use of the example source code in the book.  Please read the book before using the samples as some have specific requirements/limitations and/or 3rd party libraries.  I have tried to use as few of these as possible with portability in mind.  Finally, the source code is NOT designed to be a finished product, but rather a starting point and is provided as is.  If you would like to contribute new capabilities to the project please post your suggestions.


Password Hint: P2NMAP BOOK Figure 5-3 caption first word case sensitive!

Protected: P2NMAP_SOURCE

About the Author

Chet Hosmer is the Founder of Python Forensics, Inc. a non-profit organization focused on the collaborative development of open-source investigative technologies using the Python programming language. Chet serves as a visiting professor at Utica College in the Cybersecurity Graduate program where his research and teaching focus on advanced steganography/data hiding methods and related defenses. He is also an Adjunct Faculty member at Champlain College in the Masters of Science in Digital Forensic Science Program where he is researching and working with graduate students to advance the application Python to solve hard problems facing digital investigators.

Chet makes numerous appearances each year to discuss emerging cyber threats including National Public Radio’s Kojo Nnamdi show, ABC’s Primetime Thursday, NHK Japan and ABC News Australia. He is also a frequent contributor to technical and news stories relating to cyber security and forensics and has been interviewed and quoted by IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com, DFI News and Wired Magazine.

Chet is the author of four recent Elsevier/Syngress Books:

Chet delivers keynote and plenary talks on various cyber security related topics around the world each year.