LMYN : Lets Map Your Network To Visualise Your Physical Network

LMYN or Lets Map Your Network enables you to visualise your physical network in form of graph with zero manual error.

It is utmost important for any security engineer to understand their network first before securing it and it becomes a daunting task to have a ‘true’ understanding of a widespread network.

In a mid to large level organisation’s network having a network architecture diagram doesn’t provide the complete understanding and manual verification is a nightmare.

Hence in order to secure entire network it is important to have a complete picture of all the systems which are connected to your network, irrespective of their type, function, technology etc.

BOTTOM LINE – YOU CAN’T SECURE WHAT YOU ARE NOT AWARE OF.

Let’s Map Your Network (LMYN) aims to provide an easy to use interface to security engineer and network administrator to have their network in graphical form with zero manual error, where a node represents a system and relationship between nodes represent the connection.

LMYN does it in two phases:

  • Learning: In this phase LMYN ‘learns’ the network by performing the network commands and quering the APIs and then builds graph database leveraging the responses. User can perform any of the learning activities at any point of time and LMYN will incorporate the results in existing database.
  • Monitoring: This is a continuos process, where LMYN monitors the ‘in-scope’ network for any changes, compare it with existing information and update the graph database accordingly.

Below technologies have been used in the tool:

  • Django Python
  • Neo4j DB
  • Sigma JS
  • Celery and RabbitMQ

Also Read – Ehtools : Penetration Tools That Can Be Explored Easily

WHY IT IS

  • Visualizing infrastructure network in form of graph makes it more ‘visible’ and it becomes significantly easy to perform the analysis and identify the key areas of concern for a security engineer and network administrator
  • Also, Let’s Map Your Network formulates the graph entirely based-on either network actions performed from ‘seed’ system which will be part of the actual network or quering the APIs. Hence there is no chance of manual-error in the mapping of network

WHERE TO USE IT

  • Network Architecture ‘Validation’
  • Troubleshooting for network administrator
  • Internal Network vulnerability assessment and penetration testing

LMYN In Action

Local subnet network

Network with traceroute to mulitple destinations

CMDB Upload

Cloud network

Credit: varchashva

R K

Recent Posts

Starship : Revolutionizing Terminal Experiences Across Shells

Starship is a powerful, minimal, and highly customizable cross-shell prompt designed to enhance the terminal…

2 days ago

Lemmy : A Decentralized Link Aggregator And Forum For The Fediverse

Lemmy is an innovative, open-source platform designed for link aggregation and discussion, providing a decentralized…

2 days ago

Massive UX Improvements, Custom Disassemblers, And MSVC Support In ImHex v1.37.0

The latest release of ImHex v1.37.0 introduces a host of exciting features and improvements, enhancing…

2 days ago

Ghauri : A Powerful SQL Injection Detection And Exploitation Tool

Ghauri is a cutting-edge, cross-platform tool designed to automate the detection and exploitation of SQL…

2 days ago

Writing Tools : Revolutionizing The Art Of Writing

Writing tools have become indispensable for individuals looking to enhance their writing efficiency, accuracy, and…

2 days ago

PatchWerk : A Tool For Cleaning NTDLL Syscall Stubs

PatchWerk is a proof-of-concept (PoC) tool designed to clean NTDLL syscall stubs by patching syscall…

3 days ago