0% found this document useful (0 votes)
62 views24 pages

Enumeration

The document outlines the syllabus for the Ethical Hacking course (CCS344) at KGiSL Institute of Technology, detailing five units covering topics such as penetration testing, network scanning, enumeration, system hacking, and network protection systems. It includes course outcomes that aim to equip students with knowledge and skills in identifying vulnerabilities and performing ethical hacking. Additionally, it lists textbooks and references for further reading on the subject.

Uploaded by

realitysucks115
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views24 pages

Enumeration

The document outlines the syllabus for the Ethical Hacking course (CCS344) at KGiSL Institute of Technology, detailing five units covering topics such as penetration testing, network scanning, enumeration, system hacking, and network protection systems. It includes course outcomes that aim to equip students with knowledge and skills in identifying vulnerabilities and performing ethical hacking. Additionally, it lists textbooks and references for further reading on the subject.

Uploaded by

realitysucks115
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 24

KGiSL Institute of Technology

(Approved by AICTE, New Delhi; Affiliated to Anna University, Chennai)


Recognized by UGC, Accredited by NBA (IT)
365, KGiSL Campus, Thudiyalur Road, Saravanampatti, Coimbatore – 641035.

Department of Artificial Intelligence & Data Science


Name of the Faculty : Mrs.M.Akilandeeswari

Subject Name & Code : CCS344 ETHICAL HACKING

Branch & Department : B.Tech & AI&DS

Year & Semester : 2023 / VI

Academic Year :2023-24

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 1


UNIT I INTRODUCTION 6
Ethical Hacking Overview - Role of Security and Penetration Testers. - Penetration-Testing Methodologies- Laws of the Land -
Overview of TCP/IP- The Application Layer - The Transport Layer - The Internet Layer - IP Addressing. - Network and
Computer Attacks - Malware - Protecting Against Malware Attacks. - Intruder Attacks - Addressing Physical Security
UNIT II FOOT PRINTING, RECONNAISSANCE AND SCANNING NETWORKS 6
Footprinting Concepts - Footprinting through Search Engines, Web Services, Social Networking Sites, Website, Email -
Competitive Intelligence - Footprinting through Social Engineering -Foot printing Tools - Network Scanning Concepts - Port-
Scanning Tools - Scanning Techniques -Scanning Beyond IDS and Firewall
UNIT III ENUMERATION AND VULNERABILITY ANALYSIS 6
Enumeration Concepts - NetBIOS Enumeration – SNMP, LDAP, NTP, SMTP and DNS Enumeration - Vulnerability Assessment
Concepts - Desktop and Server OS Vulnerabilities -Windows OS Vulnerabilities
UNIT IV SYSTEM HACKING 6
Hacking Web Servers - Web Application Components- Vulnerabilities - Tools for Web Attackers and Security Testers Hacking
Wireless Networks - Components of a Wireless Network –War driving- Wireless Hacking - Tools of the Trade –
UNIT V NETWORK PROTECTION SYSTEMS 6
Access Control Lists. - Cisco Adaptive Security Appliance Firewall - Configuration and Risk Analysis Tools for Firewalls and
Routers - Intrusion Detection and Prevention Systems - NetworkBased and Host-Based IDSs and IPSs - Web Filtering - Security
Incident Response Teams –Honeypots.

2
TEXTBOOKS

1. Michael T. Simpson, Kent Backman, and James E. Corley, Hands-On Ethical Hacking and

Network Defense, Course Technology, Delmar Cengage Learning, 2010.

2. The Basics of Hacking and Penetration Testing - Patrick Engebretson, SYNGRESS,

Elsevier, 2013.

3. The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, Dafydd

Stuttard and Marcus Pinto, 2011.

REFERENCES

1. Black Hat Python: Python Programming for Hackers and Pentesters, Justin Seitz , 2014

3
SYLLABUS

UNIT III ENUMERATION AND VULNERABILITY ANALYSIS


6

Enumeration Concepts - NetBIOS Enumeration – SNMP, LDAP, NTP, SMTP and

DNS Enumeration - Vulnerability Assessment Concepts - Desktop and Server OS

Vulnerabilities -Windows OS Vulnerabilities

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 4


Course Outcomes

COURSE OUTCOMES:

At the end of this course, the students will be able:

CO1: To express knowledge on basics of computer based vulnerabilities

CO2: To gain understanding on different foot printing, reconnaissance and scanning methods.

CO3 To demonstrate the enumeration and vulnerability analysis methods

CO4: To gain knowledge on hacking options available in Web and wireless applications.

CO5: To acquire knowledge on the options for network protection.

CO6: To use tools to perform ethical hacking to expose the vulnerabilities.


CW3551/DIS/III AI&DS/V SEM/KG-KiTE 5
Enumeration:

• Enumeration is the process of establishing an active connection to the target host, where

sensitive information is collected and assessed

• Windows enumeration, NetBIOS, LDAP,SNMP are some of the types of enumeration

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 6


3.1 Enumeration

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 7


3.1 Enumeration

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 8


3.1 Enumeration NetBIOS (Network Basic Input Output System)

• NetBIOS is a Windows programming interface that allows computers to communicate across

a local area network (LAN).

• Most Windows OSs use NetBIOS to share files and printers.

• NetBIOS listens on UDP ports 137 (NetBIOS Name service) and 138 (NetBIOS Datagram

service) and TCP port 139 (NetBIOS Session service).

• File and printer sharing in Windows also requires an upper-level service called Server

Message Block (SMB), which runs on top of NetBIOS.


CW3551/DIS/III AI&DS/V SEM/KG-KiTE 9
3.1 Enumeration NetBIOS

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 10


3.1 Enumeration

• The computer names you assign to Windows systems are called NetBIOS names and have a limit of

16 characters;

• the last character is reserved for a hexadecimal number (00 to FF) that identifies the service running

on the computer.

• Therefore, you can use only 15 characters for a computer name, and NetBIOS adds the last

character automatically to identify the service that has registered with the OS.

• For example, if a computer named SALESREP is running the Server service, the OS stores this

information in a NetBIOS table.

• A NetBIOS name must be unique on a network.


CW3551/DIS/III AI&DS/V SEM/KG-KiTE 11
3.1 Enumeration

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 12


3.1 Enumeration

NetBIOS Null Sessions


•One of the biggest vulnerabilities of NetBIOS systems is a null session, which is an
unauthenticated connection to a Windows computer that uses no logon and password values.
•Many of the enumeration tools, establish a null session to gather information such as logon
accounts, group membership, and file shares from an attacked computer.
•This vulnerability has been around for more than a decade and is still present in Windows XP.
Null sessions have been disabled by default in Windows Server 2003, although administrators can
enable them if they’re needed for some reason.
• In Windows Vista and Server 2008, null sessions aren’t available and can’t be enabled, even by
administrators CW3551/DIS/III AI&DS/V SEM/KG-KiTE 13
3.1 Enumeration

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 14


3.1 Enumeration

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 15


3.1 Enumeration

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 16


3.1 Enumeration

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 17


3.1 Enumeration

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 18


3.1 Enumeration

Types Of Enumeration:

NetBIOS(Network Basic Input Output System) Enumeration:

• NetBIOS allows applications on different computers to communicate over LANs


• Currently uses TCP/IP
• Gives each computer a NetBIOS name along with normal IP address

NBT is a protocol that allows legacy applications that rely on NetBIOS to be used on modern TCP/IP networks
• NBT implements a Name Service that records all name registrations

NetBIOS provides three basic services:

• NAME SERVICE • The name service provides name registration and resolution for clients
• SESSION SERVICE • The session service provides connection-oriented communication
• DATAGRAM SERVICE • The datagram serviceCW3551/DIS/III
providesAI&DS/V
for a SEM/KG-KiTE
connectionless communication 19
3.1 Enumeration

SNMP(Simple Network Management Protocol) Enumeration:

•Simple Network Management Protocol (SNMP) is an application layer protocol that runs on

UDP and maintains and manages IP network routers, hubs, and switches.

•SNMP agents run on networking devices in Windows and UNIX networks.

•SNMP is a widely used protocol that is enabled on a wide range of operating systems, Windows

Server, Linux servers, and network devices such as routers and switches.

•On a target system, SNMP enumeration is used to list user accounts, passwords, groups, system
CW3551/DIS/III AI&DS/V SEM/KG-KiTE 20
names, and devices.
3.1 Enumeration

SNMP Enumeration is made up of three major parts:


Managed Device: A managed device is a device or a host (technically referred to as a node)
that has the SNMP service enabled. These devices include routers, switches, hubs, bridges,
computers, and so on.
Agents: An agent is a software component that runs on a managed device. Its primary
function is to convert data into an SNMP-compatible format for network management via the
SNMP protocol.
Network Management System (NMS) : NMS are software systems that are employed to
monitor network devices.

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 21


3.1 Enumeration

LDAP Enumeration:
•Lightweight Directory Access Protocol is an Internet Protocol for getting to dispersed
registry administrations.
•Registry administrations may give any coordinated arrangement of records, regularly in a
hierarchical and sensible structure, for example, a corporate email index.
•A customer starts an LDAP meeting by associating with a Directory System Agent on TCP port
389 and afterward sends an activity solicitation to the DSA.
•Data is sent between the customer and the worker utilizing Basic Encoding Rules.
•Programmer inquiries LDAP administration to assemble information such as substantial
usernames, addresses, division subtleties, and so on that can be additionally used to perform
assaults. CW3551/DIS/III AI&DS/V SEM/KG-KiTE 22
3.1 Enumeration

NTP Enumeration:

CW3551/DIS/III AI&DS/V SEM/KG-KiTE 23


3.1 Enumeration

DNS Enumeration using Zone Transfer:

•It is a cycle for finding the DNS worker and the records of an objective organization.

•A hacker can accumulate significant organization data, for example, DNS worker names, hostname, machine names,

usernames, IPs, and so forth of the objectives.

•In DNS Zone Transfer enumeration, a hacker tries to retrieve a copy of the entire zone file for a domain from the

DNS server.

•In order to execute a zone transfer, the hacker sends a zone transfer request to the DNS server pretending to be a

client; the DNS then sends a portion of its database as a zone to you. This zone may contain a ton of data about the

DNS zone organization.


CW3551/DIS/III AI&DS/V SEM/KG-KiTE 24

You might also like