Explains how to gather user lists, machine names, services, and other system-level details, including techniques for NetBIOS, SNMP, LDAP, and DNS enumeration.
5 minutes
5 Questions
Enumeration is a critical phase in the ethical hacking process that follows footprinting and scanning. During enumeration, an ethical hacker methodically collects specific information about target systems, networks, and resources. This phase involves active connections to systems to extract detailed data that can reveal potential vulnerabilities.
Enumeration aims to identify user accounts, network resources, shares, applications, services, and system configurations. The ethical hacker gathers usernames, group information, network shares, domains, and running services with their versions - all valuable intelligence for planning subsequent penetration testing steps.
Common protocols targeted during enumeration include SMTP (TCP 25), DNS (TCP/UDP 53), NetBIOS (TCP/UDP 137-139), LDAP (TCP 389), SNMP (UDP 161), TFTP (UDP 69), and SMB (TCP 445). Tools frequently employed in this phase include Nmap for port scanning with service detection, Nessus for vulnerability assessment, SNMPwalk for SNMP enumeration, enum4linux for Windows/Samba enumeration, and Metasploit modules.
SNMP enumeration is particularly valuable as it can reveal system details, network configurations, and running processes through Management Information Base (MIB) objects. NetBIOS and SMB enumeration can expose file shares, user accounts, and workgroup information in Windows environments.
What distinguishes enumeration from earlier reconnaissance phases is the active interaction with target systems rather than passive information gathering. This active probing makes enumeration more detectable but yields more specific, actionable intelligence.
Defense against enumeration includes implementing proper access controls, disabling unnecessary services, using strong authentication, configuring firewalls to block enumeration attempts, and employing intrusion detection systems to alert on suspicious enumeration activities.Enumeration is a critical phase in the ethical hacking process that follows footprinting and scanning. During enumeration, an ethical hacker methodically collects specific information about target systems, networks, and resources. This phase involves active connections to systems to extract detaile…
During a NetBIOS enumeration attack, which of the following NetBIOS codes would an attacker specifically look for to identify the domain controller in a Windows network?
Question 2
Which enumeration technique is commonly used to gather information about NetBIOS names, shares, and users on Windows systems?
Question 3
During enumeration against a target with Netstat, you notice numerous established connections on TCP port 445. What service is most likely running on this port that would be valuable for further enumeration?
🎓 Unlock Premium Access
Certified Ethical Hacker + ALL Certifications
🎓 Access to ALL Certifications: Study for any certification on our platform with one subscription
2312 Superior-grade Certified Ethical Hacker practice questions
Unlimited practice tests across all certifications
Detailed explanations for every question
CEH: 5 full exams plus all other certification exams
100% Satisfaction Guaranteed: Full refund if unsatisfied
Risk-Free: 7-day free trial with all premium features!