Ethical Hacking (part 3.0/20): Enumeration techniques with examples and tools

Maciej Zalwert
11 min readJun 13, 2021

Note: This article is being updated regularly. The latest update is as of 13/06/2021

Hackers are very cunning creatures. They can get what they want by making use of even simple applications like time synchronization utility in an operating system. This article introduces enumeration techniques to make you be aware of concepts and tools hackers use nowadays.

This article will cover:

  1. Introduction to enumeration concept
  2. NetBIOS enumeration
  3. NTP enumeration
  4. NFS enumeration
  5. LDAP enumeration
  6. SMTP enumeration
  7. DNS enumeration
  8. Enumeration countermeasures?

1. Introduction to enumeration concept

Enumeration is the third step for hackers after Footprinting\Reconnaissance and Network scanning. With an active connection, a hacker tries to gain as…

--

--

Maciej Zalwert
Maciej Zalwert

Written by Maciej Zalwert

Experienced in building data-intensive solutions for diverse industries

No responses yet