Adversaries may map the network topology of a target to understand the architecture, segmentation, and trust boundaries that govern communication between systems.
Understanding how adversaries map your network reveals why this reconnaissance sub-technique is the foundation of sophisticated cyber attacks.
Network topology reveals the complete layout, segmentation, and architecture of an organization's network. Adversaries who successfully map topology gain visibility into every subnet, VLAN, DMZ, cloud interconnect, and VPN gateway , creating a comprehensive blueprint of the target environment that would normally take years of insider knowledge to acquire. This structural intelligence is the prerequisite for virtually every subsequent attack phase.
Knowing the topology helps attackers identify critical chokepoints, understand firewall placement and rule sets, and plan lateral movement paths that exploit segmentation gaps. When an attacker understands where firewalls sit between network zones and which ports are filtered versus open, they can craft targeted exploitation strategies that bypass perimeter defenses entirely, entering through the path of least resistance rather than attacking hardened front doors.
SenseOn's Network Detection and Response (NDR) platform can identify abnormal traffic patterns indicative of active network mapping , including systematic port sweeps, TTL-based traceroute enumeration, and SNMP walking of network infrastructure devices. By correlating these low-and-slow reconnaissance signals across the network, defenders gain early warning of adversaries assembling topology maps before exploitation begins.
Source: SenseOn , LinkedInVectra AI emphasizes that reconnaissance is the critical intelligence-gathering phase where adversaries methodically map systems, identities, and trust relationships across the target environment. Network topology mapping is a core component of this phase, providing the structural context needed to identify high-value targets, credential stores, and privilege escalation opportunities that enable deeper network penetration.
Source: Vectra AI , ReconnaissanceCommon Vulnerabilities and Exposures (CVEs) grew 39% from 2023 to 2024, dramatically expanding the attack surface that adversaries can discover through topology mapping. Each newly identified network segment, cloud workload, or IoT device represents a potential foothold. With more targets exposed across increasingly complex hybrid networks, topology mapping becomes even more valuable as it helps adversaries prioritize which vulnerabilities to exploit first.
Source: Fortinet 2025 Global Threat Landscape ReportNetwork mapping helps attackers find the path of least resistance to high-value targets such as intellectual property repositories, financial systems, and executive communications. Instead of brute-forcing well-defended entry points, adversaries use topology intelligence to identify legacy systems, misconfigured routers, shadow IT connections, and unmonitored network bridges that provide quiet, undetected access to the most sensitive data in the organization.
Year-over-year increase in CVEs from 2023 to 2024 , Fortinet 2025 Global Threat Landscape Report. More vulnerabilities means more opportunities discovered through topology mapping.
Essential vocabulary for understanding network topology reconnaissance and its implications.
Network Topology (T1590.004) is a sub-technique of MITRE ATT&CK where adversaries systematically map the physical and logical layout of a target's network infrastructure. This includes identifying routers, switches, firewalls, subnets, DMZs, VLANs, cloud connections, VPN gateways, and the interconnections between them. Adversaries employ techniques such as traceroute, BGP route analysis, SNMP enumeration, ARP scanning, and network discovery protocols to build comprehensive network maps that reveal segmentation boundaries, network choke points, and lateral movement pathways. The resulting topology intelligence enables precise targeting of network devices and informs strategic decisions about which network segments to compromise for maximum operational impact.
Think of network topology like a city's road map. A city planner would know exactly which roads are one-way streets, where the bridges connect different neighborhoods, which areas are gated communities with private security, and where the highway on-ramps provide rapid access between districts. An attacker who obtains your city map knows precisely which quiet residential street leads directly to the bank vault, which bridge connects the police station to the financial district, and which back alley bypasses every security checkpoint in the city. They don't need to force their way through the front gate , they simply follow the map to the weakest point in the perimeter and walk right in through an unmarked service entrance that nobody thought to lock.
A detailed account of how T1590.004 plays out in a real organizational context.
Pinnacle Aerospace, a mid-size defense contractor specializing in satellite communication systems for military and government clients. The company operates a hybrid network spanning on-premises data centers, cloud environments, and remote engineering workstations.
Pinnacle Aerospace's network topology was fully discoverable through multiple reconnaissance vectors. SNMP community strings on internet-facing devices responded to public queries, revealing device types, firmware versions, interface configurations, and neighboring device relationships. BGP route announcements from their ASN leaked internal network structure, including the existence of previously unknown subnets. Traceroute responses from perimeter routers showed hop-by-hop internal routing, exposing the full path from internet edge to core infrastructure. A state-sponsored APT group systematically mapped their entire network over a six-week period using these techniques. The attackers identified a legacy SCADA network segment connected through an unmapped VPN tunnel that had been configured years earlier by a contractor and forgotten by the current IT team. Exploiting a known vulnerability in the VPN tunnel endpoint, the APT gained access to classified design documents for an advanced military satellite communication system, resulting in a major national security incident and a two-year remediation program costing tens of millions of dollars.
Robert Kim led a comprehensive initiative to eliminate topology exposure vectors. He disabled SNMP on all external interfaces and replaced public community strings with SNMPv3 authentication. He implemented BGP route filtering to prevent internal network structure leakage through route announcements. Robert deployed network segmentation using zero-trust microsegmentation principles, ensuring each network segment operated with least-privilege access controls. He deployed decoy routing infrastructure , honeyports and fake network responses , to actively mislead adversary mapping attempts and generate alerts when probing was detected. He implemented commercial network detection and response (NDR) tools to continuously monitor for topology reconnaissance patterns, including systematic scanning, traceroute anomalies, and SNMP enumeration attempts. Finally, Robert established monthly network topology audits to identify shadow IT, unauthorized connections, and configuration drift that could reintroduce topology exposure risks.
How adversaries execute network topology mapping from initial access to exploitation planning.
Adversaries begin with passive techniques , analyzing BGP routing tables, WHOIS records, DNS records, and SSL certificate transparency logs to identify network ranges, ASNs, and infrastructure providers associated with the target organization without generating any detectable traffic.
Using the intelligence gathered passively, attackers scan internet-facing IP ranges to identify perimeter devices: firewalls, load balancers, VPN gateways, mail servers, and web applications. Each responding device reveals its role and approximate network position in the topology.
Adversaries execute traceroute from multiple vantage points to map the hop-by-hop path from the internet through perimeter defenses into the internal network. TTL decrement analysis reveals the number of routing hops, device types, and network segmentation boundaries.
SNMP community string guessing and enumeration of network management protocols reveals device inventories, interface tables, routing tables, ARP caches, and neighbor relationships , building a complete picture of the physical and logical network layout.
Once initial access is gained through a compromised endpoint, adversaries use internal network scanning tools to discover additional subnets, VLANs, domain controllers, file servers, and trust relationships that were invisible from the external perspective.
Adversaries extend topology mapping into cloud environments by enumerating virtual networks, subnets, security groups, peering connections, and hybrid connectivity links such as site-to-site VPN tunnels and ExpressRoute circuits connecting on-premises infrastructure to cloud platforms.
With the complete topology assembled, adversaries analyze the map to identify the optimal exploitation path , selecting the weakest network segment, the most vulnerable device, or the most permissive trust relationship to advance toward their ultimate objective while minimizing detection risk.
Common organizational failures and proven defensive measures against topology reconnaissance.
Leaving default SNMP community strings like "public" and "private" on network devices provides adversaries with complete device inventories, interface configurations, routing tables, and network topology maps through standard MIB queries.
Failing to implement BGP prefix filtering allows adversaries to analyze route advertisements and infer internal network structure, segment allocations, and interconnection topology from publicly accessible routing tables.
Allowing ICMP Time Exceeded messages and unfiltered traceroute responses on perimeter devices gives adversaries direct visibility into the number of network hops, device placement, and segmentation boundaries within the internal network.
Deploying networks without proper segmentation means that once topology mapping discovers a single entry point, adversaries can access virtually any system without encountering additional security boundaries or access controls.
Disable SNMP on all internet-facing interfaces and migrate internal SNMP to version 3 with authentication and encryption. Where SNMP is required, implement strict access control lists limiting queries to authorized management stations only.
Deploy prefix lists and route maps that filter BGP announcements to prevent internal network structure leakage. Use RPKI to validate route authenticity and consider using dedicated internet-exit points for public services.
Use decoy network infrastructure , honeyports, fake routing responses, and synthetic network services , to mislead topology mapping attempts. These decoys generate high-fidelity alerts when adversaries interact with them during reconnaissance.
Implement zero-trust network architecture with microsegmentation that enforces least-privilege access between every network segment. Even if adversaries map the topology, each lateral movement step requires explicit authentication and authorization.
Offensive and defensive perspectives on network topology mapping operations.
Hunting queries, detection logic, and investigation techniques for identifying network topology reconnaissance.
Detect systematic traceroute activity by identifying sources sending sequential ICMP Echo Requests with incrementally increasing TTL values to multiple destinations. Legitimate diagnostic traffic is typically ad-hoc and limited to specific hosts, while reconnaissance traceroute targets diverse IP ranges in methodical patterns. Cross-reference with known management workstations to reduce false positives from authorized network troubleshooting.
Identify SNMP walking by detecting single sources querying the SNMP port (161/162) on multiple destination IP addresses within a short time window. Adversaries performing topology mapping through SNMP enumeration systematically probe management interfaces across network device ranges to extract routing tables, ARP caches, and interface configurations that reveal network topology.
Hunt for horizontal scanning patterns where a single internal source attempts connections to an unusually high number of destinations in a short timeframe. Rapid sequential connection attempts with minimal data transfer are characteristic of topology discovery scanning, particularly when the scanning host has no legitimate administrative function. Investigate the source for signs of initial access compromise.
Monitor BGP routing updates for leaks of private address space (RFC 1918) or unexpected route announcements that reveal internal network structure. Adversaries and misconfigured routers alike can expose internal topology through BGP. Additionally, monitor for new route announcements from the organization's ASN that expose previously unknown network segments, which may indicate either misconfiguration or active reconnaissance exploitation of routing infrastructure.
Network topology mapping is the adversary's first step toward understanding your environment. Deploy NDR solutions, eliminate information leakage, implement zero-trust segmentation, and continuously hunt for reconnaissance activity. The earlier you detect mapping attempts, the more time you have to harden your defenses before exploitation begins. Review the complete T1590 technique family and related sub-techniques to build a comprehensive reconnaissance defense strategy.
View MITRE ATT&CK Official Page →
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.