NWHK CHAP4-Network Hacking - Enumeration v.1
NWHK CHAP4-Network Hacking - Enumeration v.1
Network Hacking
(Enumeration)
OBJECTIVES
Concepts of Enumeration
▪ Process of identifying active services to a
target system to discover potential attack
surface or vector.
▪ List of username and groups
▪ Hostname
▪ Running services
▪ Application banners
▪ etc
Service Enumeration
▪ To determine the services running on a
target
▪ Extract running service information
▪ nmap -sV [IP address]
▪ Use the extracted service information to
search for vulnerabilities and exploits
▪ Exploits Database
(https://www.exploit-db.com/) POC: Proof of concept
▪ Google Search
▪ VulDB (https://vuldb.com/)
ET0741 Network Hacking
Official (Open)
Service Enumeration
▪ Enumeration can be performed on the
following
▪ RPC enumeration
▪ RMI enumeration
▪ SMB enumeration
▪ NetBIOS enumeration
▪ SNMP enumeration
▪ LDAP enumeration
metasploit is a framework
Framework: Encompasses multiple softwares
Version 4 preferred because tcp version 4 got ack mssg. So it is more reliable
over WAN but for local can still use LAN.
Source: https://en.wikipedia.org/wiki/NetBIOS
3 levels of verbosity:
v
vv
vvv
LDAP Enumeration
Summary