GATHERING NETWORK AND HOST INFORMATION

Get Started. It's Free
or sign up with your email address
GATHERING NETWORK AND HOST INFORMATION by Mind Map: GATHERING NETWORK AND HOST INFORMATION

1. Enumeration classification

1.1. NetBios Enumeration

1.2. SNMP Enumeration

1.2.1. Tools

1.2.1.1. SNMPUtil

1.2.1.2. SolarWinds' IP network Browser

1.3. LDAP Enumeration

1.4. NTP Enumeration

1.5. SMTP Enumeration

1.6. DNS Enumeration

1.7. Windows Enumeration

1.8. UNIX /Linux Enumeration

2. Null Sessions

2.1. The problem is that they are also a source of potential abuse as well.

2.2. NULL session can reveal a wealth of information

2.3. Basically a NULL session is something that occurs when a connection is made to a Windows system without credentials being provided.

3. Types of scanning

3.1. Port scanning

3.1.1. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer.

3.2. Network scanning

3.2.1. Is mainly used for security assessment, system maintenance, and also for performing attacks by hackers

3.3. Vulnerability scanning

3.3.1. A vulnerability scan is used to identify weaknesses or vulnerabilities on a target system

4. Define Enumeration

4.1. The process of extracting information from a target system in an organized and methodical manner

4.2. Using active connections to the system to perform more aggressive information gathering

4.3. Information to be collected during the enumeration

4.3.1. Usernames, group names

4.3.2. Hostnames

4.3.3. Network shares and services

5. Significance of Enumeration

5.1. Enumeration is often considered as a critical phase in Penetration testing as the outcome of enumeration can be used directly for exploiting the system

6. Scanning Methodology

6.1. Checking for live system

6.2. Checking for open ports

6.3. Service identification

6.4. Banner grabbing/OS fingerprinting

6.5. Vulnerability scanning

6.6. Draw network diagrams of vulnerable hosts

6.7. Prepare proxies

6.8. Attack