Enumeration

Extracting detailed system information.

Explains how to gather user lists, machine names, services, and other system-level details, including techniques for NetBIOS, SNMP, LDAP, and DNS enumeration.
5 minutes 5 Questions

Enumeration is a critical phase in the ethical hacking process that follows footprinting and scanning. During enumeration, an ethical hacker methodically collects specific information about target systems, networks, and resources. This phase involves active connections to systems to extract detaile…

Concepts covered: NTP and NFS Enumeration, Enumeration Concepts, NetBIOS Enumeration, SNMP Enumeration, LDAP Enumeration, SMTP and DNS Enumeration, Other Enumeration Techniques, Enumeration Countermeasures

Test mode:
CEH - Enumeration Example Questions

Test your knowledge of Enumeration

Question 1

During a NetBIOS enumeration attack, which of the following NetBIOS codes would an attacker specifically look for to identify the domain controller in a Windows network?

Question 2

Which enumeration technique is commonly used to gather information about NetBIOS names, shares, and users on Windows systems?

Question 3

During enumeration against a target with Netstat, you notice numerous established connections on TCP port 445. What service is most likely running on this port that would be valuable for further enumeration?

More Enumeration questions
120 questions (total)