CEH v10 Module 04 - Enumeration
CEH v10 Module 04 - Enumeration
Technology Brief
In the earlier processes like Footprinting and Scanning, we have understood
how to collect information about any organization, target website, or a
particular network. We have also discussed several tools that can be helpful
in collecting the general information regarding the target. Now we are
moving to observe the target more closely in order to gain detailed
information. This information is sensitive such as network information,
network resources, routing paths, SNMP, DNS and other protocol-related
information, user and group information, etc. This sensitive information is
required to gain access to a system. This information is gathered by using
different tools and techniques actively.
Enumeration Concepts
Enumeration
In the phase of Enumeration, An attacker initiates active connections with the
target system. With this active connection, direct queries are generated to
gain more information. These information helps to identify the system attack
points. Once attacker discovers attack points, it can gain unauthorized access
using this collected information to reach assets.
Information that is enumerated in this phase are: -
Routing Information
SNMP Information
DNS Information
Machine Name
User Information
Group Information
Application and Banners
Network Sharing Information
Network Resources
In the previous phases, the finding was not too concerned with any legal
issues. Using the tools required for enumeration phase may cross legal
boundaries and chances to being traced as using active connections with the
target. You must have proper permission to perform these actions.
Performing Ping Sweep on the subnet to check live host and other basic
information.
Enter the command: root@kali:~# nmap –sU -p 10.10.10.12
Figure 4-02 UDP Port Scanning
UDP port scanning for port 161 (SNMP Port) for the target host
10.10.10.12. The result shows SNMP port 161 is open & filtered. Now
enter the command: root@kali:~# nmap –sS 10.10.10.12 to perform a
Stealthy scan on target host 10.10.10.12
Figure 4-03 Stealth Scan
The result shows a list of open ports and services running on the target host.
Enter the command: root@kali:~# nmap –sSV -O 10.10.10.12
Operating System & Version scanning on target host 10.10.10.12.
After starting the Enumeration, it will gather the information about the
target machine such as MAC address information, operating system
information and other information depending upon the type of enumeration
selected before initiating the process.
Figure 4-06 Windows Enumeration
After Scanning, select your target host and right click on it.
Go to Properties.
This host does not have any shared resource with anyone.
SNMP Enumeration
SNMP Enumeration
Simple Network Management Protocol (SNMP) Enumeration is a technique
of enumeration using most widely used network management protocol
SNMP. In SNMP Enumeration, user accounts and device information is
targeted using SNMP. SNMP requires community string to authenticate the
management station.
ntpq is a command line utility that is used to query the NTP server. The ntpq
is used to` monitor NTP daemon ntpd operations & determine performance.
It uses the standard NTP mode 6 control message formats.
Ntpq command can be used with following options: -
Options Description
-c The following argument is interpreted as an interactive format
command and is added to the list of commands to be executed
on the specified host(s). Multiple -c options may be given.
-d Turn on debugging mode.
-i Force ntpq to operate in interactive mode. Prompts will be
written to the standard output and commands read from the
standard input.
-n Output all host addresses in the dotted-quad numeric format
rather than converting to the canonical host names.
-p Print a list of the peers known to the server as well as a
summary of their state. This is equivalent to the peer's
interactive command.
-4 Force DNS resolution of following host names on the
command line to the IPv4 namespace.
-6 Force DNS resolution of following host names on the
command line to the IPv6 namespace.
Table 4-10 ntpq command options
Mind Map