0% found this document useful (0 votes)
11 views

Module 02 Lab Assignment 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Module 02 Lab Assignment 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Lab Assignment Number 3

Lab Assignment Name Enumeration

Fig1. ( Perform NetBIOS Enumeration) nbtstat -a [IP address of the remote machine] In this
command, -a displays the NetBIOS name table of a remote computer.
Fig2. ( Perform SNMP Enumeration) snmpwalk -v1 -c public [target IP] –v: specifies the SNMP
version number (1 or 2c or 3) and –c: sets a community string. The result displays all the OIDs,
variables, and other associated information.
Fig3.( Perform LDAP Enumeration) The Active Directory Explorer displays the active directory
structure in the left pane, as shown in the screenshot.

Fig4. nmap -p 2049 [Target IP Address] -p: specifies port. The scan result appears indicating
that port 2049 is opened, and the NFS service is running on it, as shown in the screenshot.
Fig5 dig ns [Target Domain] command (here, the target domain is www.certifiedhacker.com)
In this command, ns returns name servers in the result.
Fig6. ( Perform DNS Enumeration) set querytype=soa sets the query type to SOA (Start of
Authority) record to retrieve administrative information about the DNS zone of the target
domain certifiedhacker.com.

Fig7. ( Perform SMTP Enumeration) nmap -p 25 --script=smtp-enum-users [Target IP


Address] -p: specifies the port, and --script: argument is used to run a given script (here, the
script is smtp-enum-users).
Fig8. The Scan summary of the scanned target IP address (10.10.1.22) appears.

Fig9. sgpt --shell “Perform NetBIOS enumeration on target IP 10.10.1.11” command to


perform NetBIOS enumeration on a target system.
Lab Observations/ Enumeration:

In this lab, we have explored several enumeration techniques like :


NetBIOS enumeration using Windows command-line utilities for example the command
nbtstat -a [IP address of the remote machine] In this command, -a displays the NetBIOS
name table of a remote computer.
SNMP enumeration using SnmpWalk, enumeration using Active Directory Explorer (AD
Explorer), NFS enumeration using RPCScan and SuperEnum, DNS enumeration using zone
transfer like (dig ns [Target Domain] command (here, the target domain
is www.certifiedhacker.com) In this command, ns returns name servers in the result.)
SMTP enumeration using Nmap, enumeration using various enumeration tools, Enumerate
information using Global Network Inventory, and perform enumeration using AI (ShellGPT).

You might also like