LightBlog

Tuesday, 27 November 2018

Ethical Hacking tutorials - What is Enumeration?

Ethical Hacking tutorials - What is Enumeration?

Ethical Hacking Tutorials - What is Enumeration?


Enumeration
makes a Fixed Active Connection to a system.
  • User name and user group
  • List of computer their operating system and Open Port
  • Extract usernames using enumeration
  • Gather information about the host using null sessions
  • Perform Windows enumeration using the SuperScan tool
  • Acquire the user accounts using the tool GetAcct
  • Perform SNMP port scanning.
After the Scanning is calculated and the process of collecting and compiling user names, machine names, Network resources, shares, and services is done.

It also proactively refers to inquiring or connecting to the query system actively to obtain this information.

Type of Enumeration


Net BIOS Enumeration(Network Basic Input Output System)

NetBIOS Network stands for Basic Input Output System. It allows Computer communication over a LAN and allows them to share files and printers.

The name of the NetBIOS is used to identify network devices on TCP / IP.

It should be unique on the network, should be limited to 16 characters where 15 characters are used for the device's name and the 16th character is reserved for running the service type or identifying the name of the record type.

Attackers use the NetBIOS calculation to use:
  • List of computers related to domains
  • List of shares on the personal host on the network
  • Policies and passwords

SNMP Enumeration


SNMP (Simple Network Management Protocol) is an application layer protocol that uses the UDP protocol to maintain and manage the router, hub, and switch to other network devices on the IP network.

SNMP is a very common protocol that is capable of operating on a variety of operating systems like Windows Server, Linux and Unix servers as well as on network devices like router, switches, etc.

LDAP Enumeration


The Lightweight Directory Access Protocol is a protocol used to access directory listings in Active Directory or from other directory services. A directory is usually compiled in a hierarchical and logical format, like management and staff level in a company.

LDAP domain names are tied in the system to allow integrated quick lookup and faster resolution of queries. LDAP usually runs on port 389 and is similar to other protocols, usually with a separate set of rules (RFCs).

It is possible to ask the LDAP service, sometimes anonymously to determine a great deal of information that the tester can obtain a valid user name, address, departmental details, which can be used in brute force or social engineering attack is.

Tools

Jxplorer
LDAP Admin Tool

NTP Enumeration

NTP Network Protocol is a protocol designed to synchronize the clocks. With the vulnerability analysis/entrance testing aspect, data available when querying the NTP server can prove to be valuable and usually available without the need for any formal authentication.

SNMP Enumeration


The SNMP calculation is the process of using SNMP to calculate user accounts on a target system.

SNMP employs two major types of software components for communication: SNMP agent, which is located on the networking device, and the SNMP management station, which communicates with the agent.

Almost all network infrastructure including router and switch and Windows system is an SNMP agent to manage the system or device in the device. The SNMP management sends the request to the station agents, and the agent answers back the answer.

Refer to the configuration variable accessible by request and answer agent software. Management stations can also send requests to determine prices for some variables. The mesh management tells the station that something important has happened in the agent software, such as reboots or interface failure.

Management Information Base (MIB) is the database of configuration variables that resides on the networking device.

Hacking Process

First: Footpring
   
 The fine art of gathering target information
                   
Second: Scanning
       
What is the Running on the Target System

Third: Enumeration

Enumeration makes a Fixed Active Connection to a system

Related: 
Tags: enumeration,what is enumeration,what is enumeration in c,what is enumeration in java,what is enumeration data type,java enumeration,types of enumeration,enumeration in c,enumerations,what is enumeration in programming languages in hindi,what is enum,what is enumerated data type,enum,netbios enumeration,types enumeration,smb enumeration,bus enumeration,snmp enumeration,c# enumeration,netbios enumeration kali

1 comment: