Ethical Hacking - Enumeration

Enumeration is the process of extracting user names, machine names, network resources, shares and services from a system. In this phase, the attacker creates an active connection to the system and performs directed queries to gain more information about the target. The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase.

Techniques for Enumeration  :

  • Extracting user names using email ID's

  • Extract information using the default password

  • Brute Force Active Directory

  • Extract user names using SNMP (Simple Network Management Protocol)

  • Extract user groups from Windows

  • Extract information using DNS Zone transfer