From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,600 courses taught by industry experts.

Introducing enumeration techniques

Introducing enumeration techniques

From the course: Certified Ethical Hacker (CEH)

Introducing enumeration techniques

- Enumeration is the analysis of a system in order to determine what to attack. And we're going to do this by sending active queries to the system. Various services that might be offered by a system to determine things like users, groups, information from simple network management protocol, network shares, machine names, DNS names, routing tables, banners and services. Techniques in order to enumerate, default passwords. If I were to connect to a service and send, for example, username admin, password password, and it comes back and says, "That account does not exist," versus "That password is incorrect," if I send administrator and password, and it says, "Password is incorrect," what do I know? I know that the admin user account does not exist, but administrator does. Other techniques exist for extracting groups, active directory data extraction, SNMP walking, zone transfer through DNS, and usernames from email. We're going to talk about all of these in the subsequent lessons. Now…

Contents