Enumeration and its Types
ceh training
ethical hacking pdf
ec council ceh training
enumeration in ceh
Types of information enumerated by intruders:
- Network Resource and shares
- Users and Groups
- Routing tables
- Auditing and Service settings
- Machine names
- Applications and banners
- SNMP and DNS details
ceh training
ethical hacking pdf
ec council ceh training
enumeration in ceh
ethical hacking pdf
ec council ceh training
enumeration in ceh
Techniques for Enumeration
- Extracting user names using email ID's
- Extract information using the default password
- Brute Force Active Directory
- Extract user names using SNMP
- Extract user groups from Windows
- Extract information using DNS Zone transfer
ceh training
ethical hacking pdf
ec council ceh training
enumeration in ceh
Services and Port to Enumerate
- TCP 53: DNS Zone transfer
- TCP 135: Microsoft RPC Endpoint Mapper
- TCP 137: NetBIOS Name Service
- TCP 139: NetBIOS session Service (SMB over NetBIOS)
- TCP 445: SMB over TCP (Direct Host)
- UDP 161: SNMP
- TCP/UDP 389: LDAP
- TCP/UDP 3368: Global Catalog Service
- TCP 25: Simple Mail Transfer Protocol (SMTP)
ceh training
ethical hacking pdf-
ec council ceh training
enumeration in ceh
No comments:
Post a Comment