5 Pro Tips for Effective Network Enumeration

Feb 18, 2025

5 Pro Tips for Effective Network Enumeration in 2025

(From a CCIE Who’s Been Mapping Networks Since Before Nmap Had Colours)

G’day mates, Dave here — CCIE #19162, 20+ years turning coffee into packets, former Cisco TAC escalation engineer, and the bloke who still gets excited when he sees a perfectly crafted ARP table.

I’ve enumerated more networks than most of you have had hot dinners:

  • Fortune-50 enterprises with 400,000+ endpoints

  • Government SCIFs where you’re not even allowed a USB stick

  • ISP core networks that would make your eyes bleed

  • And yes, the occasional red-team gig (legally, of course)

In 2025, the game has changed. IPv6 is everywhere, SD-WAN overlays hide the truth, zero-trust makes everything look hostile, and the bad guys are using the exact same tools we are — only faster. Here are the five pro tips I actually use every single time I touch a new network. No fluff, no “run nmap -A”, just the stuff that separates the script kiddies from the people who get paid the big bucks.

Pro Tip 1: Never Trust the Diagram – ARP Tables Are the Source of Truth.

Everyone shows you a pretty Visio with Layer-3 switches and firewalls neatly labelled.
99% of the time it’s out of date the day it’s printed.What actually works in 2025:

bash

# On the core switch (Cisco, Arista, Juniper – they all have it)
show ip arp | include 0000.0000.0000   # Find the default gateway MAC

That single MAC address is your “Patient Zero”.
Follow it across every switch with show mac address-table and you’ll discover:

  • Undocumented VLANs

  • Rogue devices plugged into meeting rooms

  • That “legacy” server farm everyone forgot about

  • IoT garbage that’s been VLAN-hopped by a contractor

I once found an entire unpatched 2012 Windows domain controller in a 2024 zero-trust environment because its MAC was still replying to ARP from the CEO’s boardroom port.


Pro Tip 2: Passive First, Active Second – Let the Network Talk to You

Active scanning gets you caught.
Passive enumeration gets you the crown jewels while sipping coffee.

My 2025 passive toolkit (runs on a £30 Raspberry Pi):


bash

tcpdump -i any -s 0 -w capture.pcap '(arp or lldp or cdp or stp or dhcp or dhcpv6 or icmpv6)' &
bettercap -iface eth0 -caplet

Let it run for 4–8 hours and you’ll have:

  • Full Layer-2 topology (thanks LLDP/CDP)

  • Every IPv4 and IPv6 address (DHCP + NDP)

  • Hostnames, OS fingerprints, open ports (from normal traffic)

  • Default gateways, DNS servers, NTP servers (gold for pivoting)

Only after passive do I go active — and then only surgical strikes with Nmap’s --spoof-mac and -sS -T2 --spoof-source.


Pro Tip 3: IPv6 Is the Blind Spot Everyone Still Ignores

In 2025, every corporate network has IPv6 enabled somewhere.
And 99% of security tools still default to IPv4-only.


Quick wins:


bash

# Find the IPv6 routers
nmap -6 --script=ipv6-ra --script-args='new-only' -T4 fe80::/10

# Enumerate live hosts the lazy way
nmap -6 -sn 2001

I regularly find:

  • Entire management subnets only reachable via IPv6

  • Printers and IoT devices with link-local services wide open

  • Dual-stacked servers where IPv4 is firewalled but IPv6 is not

If you’re not enumerating IPv6 in 2025, you’re missing half the network.


Pro Tip 4: Follow the SNMP – It Still Rules Everything

SNMPv3 is “secure”.
SNMPv2c community strings like “public”, “private”, “cisco” still work on 40% of enterprise devices.

The nuclear option (use responsibly):


bash

onesixtyone -c /usr/share/wordlists/snmp.txt <broadcast-ip>
snmwalk -v2c -c public <device> system
snmwalk -v2c -c public <device> ifDescr
snmwalk -v2c -c public <device> ipNetToMediaPhysAddress   # ARP table!
snmwalk -v2c -c public <device> 1.3.6.1.4.1.9.9.166.1.15.1.1  # Cisco trustSec, anyone?

One SNMP read community and you have:

  • Full interface list

  • ARP tables

  • Routing tables

  • VLAN database

  • Sometimes even the running config (yes, really)

Pro Tip 5: Automate the Boring, Visualise the Rest

Manual enumeration is dead.
Here’s my 2025 stack that runs in <15 minutes on a new network:


bash

# 1. Passive (overnight)
bettercap + tcpdump

# 2. Active surgical
masscan -p0-65535 10.0.0.0/8 --rate=10000 --excludefile exclusions.txt
nmap -iL masscan.targets -sCV -O --version-intensity 9 -T4

# 3. IPv6
ipv6-discover.pl or thc-ipv6 toolkit

# 4. Visualise

The goal isn’t a massive text file.
The goal is a living diagram that updates itself.

Final Words From an Old CCIE

The network doesn’t lie.
People do. Diagrams do. Asset registers do.But packets? Packets are honest. Listen to them, follow the MAC addresses, embrace IPv6, abuse SNMP while it still works, and never, ever trust a diagram.

Now go forth and enumerate.– Dave (the bloke who still has a framed packet capture of the first IPv6 RA he ever saw)
CCIE #19162 | Ex-Cisco TAC | Still believes spanning-tree is the root of all evil
November 21, 2025

HeadinRack