Professional Documents
Culture Documents
Lecture 5 Enumeration-1
Lecture 5 Enumeration-1
Enumeration
Outline
Enumeration
Information obtained from the Enumeration
Techniques of Enumeration
Enumeration types :
NETBIOS , SNMP , LDAP , NTP , NFS , DNS , UNIX , Telnet
Countermeasure
Enumeration
Enumeration involves an attacker creating active connections with a
target system and performing directed queries to gain more
information about the target
Attackers use the extracted information to identify points for a
system attack and perform password attacks to gain unauthorized
access to information system resources
Enumeration techniques are conducted in an intranet environment
Information obtained from Enumeration
Network Resources
Network Shares
Routing Tables
Machine Names
Users and Groups
Application and Banners
SNMP and FQDN details
Audit and Service Settings
Enumeration Tools
NetBIOS Enumerator
NMAP
nmap –sV -v --script nbtstat.nse <target _ IP @ >
Advanced IP Scanner
Hyena
Global Network Inventory
SNMP Enumeration Tools
Snmpcheck (snmp_enum Module)
Softperfect Network Scanner
Network Performance Monitor ( www.solarwinds.com)
Engineers ToolSet
LDAP Enumeration Tools
Softerra LDAP Administrator
LDAP Admin Tool( https://ldapsoft.com)
LDAP Account Manager(https://ldap-account-manager.org)
LDAP Search (https://securityxploded.com)
NTP Enumeration Tools
PRTG Network Monitor
NMAP
Wireshark
NTP Server Scanner
DNS Enumeration using Zone Transfer