Network Reconnaissance
Network Reconnaissance: wireless shadow mapping
Indoor wireless mapping lab that respects Japanese radio regulations while teaching how rogue AP narratives appear in enterprise client campuses.
Description
Participants analyze PCAPs from a simulated corporate tower, correlate DHCP churn, and build a floor-by-floor risk narrative. Hardware transmitters stay powered down; all RF phenomena are replayed through lawful recordings.
Features
- Printed spectrum timeline for correlating user complaints to AP migrations
- Exercise on translating vendor graphs into executive summaries
- Hands-on with Ekahau exports sanitized for classroom use
- Discussion on procurement-ready vendor questions for AP refresh cycles
- Mini lab on guest VLAN leakage patterns
Outcomes
- Create a floor plan overlay with three annotated risk callouts
- Draft questions for facilities teams about physical port exposure
- Summarize regulatory constraints that affect onsite testing in JP
FAQ
Will we broadcast SSIDs?
No live transmissions; all exercises use offline captures and emulators.
Equipment provided?
We loan spectrum plots on USB sticks; bring your own laptop with 802.11ac or newer.
Limitations?
Outdoor municipal networks are out of scope for this cohort.
Participant notes
Wireless shadow mapping lab finally gave me vocabulary to talk with facilities about rogue AP fears without sounding theatrical.
— Mateo Silva , Field operations lead · 4/5 · Trustpilot
Ekahau export segment felt short, but the follow-up office hours filled gaps with annotated examples.
— Yui Morita , Network analyst