CEH 4-Enumeration
What is Enumeration?
- Enumeration is the process of establishing an active connection to the target host.
- To discover potential attack vectors in the computer system.
- Information gained at this phase can be used for further exploitation of the system.
- It is often considered as a critical phase because few pieces of information gathered in this phase can help us directly exploit the target computer.
Information gathered in this phase
- Usernames, Group names
- Hostnames
- Network shares and services
- IPtables and routing tables
- Service settings and Audit configurations
- Application and banners
- SNMP and DNS Details
1. NetBIOS Enumeration:
- NetBIOS stands for Network Basic Input Output System.
- It allows computers to communicate over a LAN to share files and devices like printers.
- NetBIOS names are used to identify network devices over TCP/IP.
Attackers use the NetBIOS enumeration to obtain:
- List of computers that belong to a domain
- List of shares on the individual hosts on the network
- Policies and passwords
Tools:
- nmblookup
- nbtscan
2. SMB Enumeration
- SMB stands for Server Message Block.
- It is mainly used for providing shared access to files, printers and miscellaneous communications between nodes on a network.
- It also provides an authenticated inter-process communication mechanism.
Tools:
- smbmap
- smbclient
- nmap(smb-vuln*)
3. DNS Enumeration
- DNS enumeration retrieves information regarding all the DNS servers and their corresponding records related to an organization.
- DNS enumeration will yield usernames, computer names, and IP addresses of potential target systems.
- dig
- host
- dnsenum
- nmap(dns-brute)
Comments
Post a Comment