Enumeration & Exploitation

Enumeration is described as a technique that establishes an active connection to the target hosts to locate possible attack vectors in the target system, 

Enumeration is used to gather the below

  • Usernames, Group names
  • Hostnames
  • Network shares and services
  • IP tables and routing tables
  • Service settings and Audit configurations
  • Application and banners
  • SNMP and DNS Details

Enumeration is usually assumed as an essential stage in Pentesting as the result of enumeration may be operated straight for exploiting the target system.

Here is useful tool for Enumeration & Exploitation;

  1. Nmap
  2. enum4linux
  3. Metasploit Framework
  4. Sqlmap
  5. Exploitdb
NCL: Enumeration and Exploitation
Metasploit for Beginners

Powered by National University

%d bloggers like this: