Enumeration is described as a technique that establishes an active connection to the target hosts to locate possible attack vectors in the target system,
Enumeration is used to gather the below
- Usernames, Group names
- Hostnames
- Network shares and services
- IP tables and routing tables
- Service settings and Audit configurations
- Application and banners
- SNMP and DNS Details
Enumeration is usually assumed as an essential stage in Pentesting as the result of enumeration may be operated straight for exploiting the target system.
Here is useful tool for Enumeration & Exploitation;