Network Recon Simulator
Network reconnaissance trainer using simulated WiGLE wireless surveys and Shodan scan data. Identify vulnerabilities across four scenario types.
All Training →Network reconnaissance trainer. Each scenario presents wireless survey data from WiGLE and internet scan results from Shodan. Analyze both datasets and identify the vulnerabilities.
The WiGLE tab shows discovered wireless networks with SSIDs, MAC addresses, encryption types, and hardware vendors. Look for open networks, naming patterns that reveal internal structure, and vendor information that might indicate default credentials.
The Shodan tab shows internet-facing devices with IPs, open ports, and service banners. Old software versions, cleartext protocols like Telnet and FTP, and exposed IoT devices are common findings.
After reviewing both datasets, complete the vulnerability checklist: open WiFi networks, vulnerable services, exposed IoT devices, and the most viable attack vector.
Scenarios include corporate headquarters, stadiums, warehouses, and financial campuses.