Enumeration
Enumeration
2
TEXTBOOKS
1. Michael T. Simpson, Kent Backman, and James E. Corley, Hands-On Ethical Hacking and
Elsevier, 2013.
3. The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, Dafydd
REFERENCES
1. Black Hat Python: Python Programming for Hackers and Pentesters, Justin Seitz , 2014
3
SYLLABUS
COURSE OUTCOMES:
CO2: To gain understanding on different foot printing, reconnaissance and scanning methods.
CO4: To gain knowledge on hacking options available in Web and wireless applications.
• Enumeration is the process of establishing an active connection to the target host, where
• NetBIOS listens on UDP ports 137 (NetBIOS Name service) and 138 (NetBIOS Datagram
• File and printer sharing in Windows also requires an upper-level service called Server
• The computer names you assign to Windows systems are called NetBIOS names and have a limit of
16 characters;
• the last character is reserved for a hexadecimal number (00 to FF) that identifies the service running
on the computer.
• Therefore, you can use only 15 characters for a computer name, and NetBIOS adds the last
character automatically to identify the service that has registered with the OS.
• For example, if a computer named SALESREP is running the Server service, the OS stores this
Types Of Enumeration:
NBT is a protocol that allows legacy applications that rely on NetBIOS to be used on modern TCP/IP networks
• NBT implements a Name Service that records all name registrations
• NAME SERVICE • The name service provides name registration and resolution for clients
• SESSION SERVICE • The session service provides connection-oriented communication
• DATAGRAM SERVICE • The datagram serviceCW3551/DIS/III
providesAI&DS/V
for a SEM/KG-KiTE
connectionless communication 19
3.1 Enumeration
•Simple Network Management Protocol (SNMP) is an application layer protocol that runs on
UDP and maintains and manages IP network routers, hubs, and switches.
•SNMP is a widely used protocol that is enabled on a wide range of operating systems, Windows
Server, Linux servers, and network devices such as routers and switches.
•On a target system, SNMP enumeration is used to list user accounts, passwords, groups, system
CW3551/DIS/III AI&DS/V SEM/KG-KiTE 20
names, and devices.
3.1 Enumeration
LDAP Enumeration:
•Lightweight Directory Access Protocol is an Internet Protocol for getting to dispersed
registry administrations.
•Registry administrations may give any coordinated arrangement of records, regularly in a
hierarchical and sensible structure, for example, a corporate email index.
•A customer starts an LDAP meeting by associating with a Directory System Agent on TCP port
389 and afterward sends an activity solicitation to the DSA.
•Data is sent between the customer and the worker utilizing Basic Encoding Rules.
•Programmer inquiries LDAP administration to assemble information such as substantial
usernames, addresses, division subtleties, and so on that can be additionally used to perform
assaults. CW3551/DIS/III AI&DS/V SEM/KG-KiTE 22
3.1 Enumeration
NTP Enumeration:
•It is a cycle for finding the DNS worker and the records of an objective organization.
•A hacker can accumulate significant organization data, for example, DNS worker names, hostname, machine names,
•In DNS Zone Transfer enumeration, a hacker tries to retrieve a copy of the entire zone file for a domain from the
DNS server.
•In order to execute a zone transfer, the hacker sends a zone transfer request to the DNS server pretending to be a
client; the DNS then sends a portion of its database as a zone to you. This zone may contain a ton of data about the