Ethical Hacking (part 3.0/20): Enumeration techniques with examples and tools
Note: This article is being updated regularly. The latest update is as of 13/06/2021
Hackers are very cunning creatures. They can get what they want by making use of even simple applications like time synchronization utility in an operating system. This article introduces enumeration techniques to make you be aware of concepts and tools hackers use nowadays.
This article will cover:
- Introduction to enumeration concept
- NetBIOS enumeration
- NTP enumeration
- NFS enumeration
- LDAP enumeration
- SMTP enumeration
- DNS enumeration
- Enumeration countermeasures?
1. Introduction to enumeration concept
Enumeration is the third step for hackers after Footprinting\Reconnaissance and Network scanning. With an active connection, a hacker tries to gain as…