What is enumeration in ethical hacking

0 votes
Can somebody explain regarding enumerations in the context of ethical hacking? Is it similar to enumerations in Java?
Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 19,610 points
4,525 views

1 answer to this question.

0 votes

Enumeration is a part of the first phase of ethical hacking which is information gathering.

It is a process where the attacker establishes an active connection with the target and tries to find as many factors possible, which could be used to carry out the attack.

This technique can be used to gain information on −

  • Network shares

  • SNMP data, if they are not secured properly

  • IP tables

  • Usernames of different systems

  • Passwords policies lists

It depend on the services that the systems offer that could include the following −

  • DNS enumeration

  • NTP enumeration

  • SNMP enumeration

  • Linux/Windows enumeration

  • SMB enumeration

Hope this helps!

To know more, join our Ethical Hacking Course today.

answered Feb 3, 2020 by Sirajul
• 59,190 points

edited Oct 6, 2021 by Sarfaraz

Related Questions In Cyber Security & Ethical Hacking

0 votes
1 answer

What is hacking in cyber security?

Hacking refers to the misuse of devices ...READ MORE

answered Dec 14, 2021 in Cyber Security & Ethical Hacking by Aditi
• 300 points
140 views
0 votes
1 answer

what is hacking in cyber security

An effort to attack a computer system ...READ MORE

answered Jan 31 in Cyber Security & Ethical Hacking by Edureka
• 10,880 points
148 views
0 votes
1 answer

What is the best books for hacking beginners to advace and also networking please refer good books ?

Here's the booklist for Ethical hacking for ...READ MORE

answered Apr 20, 2020 in Cyber Security & Ethical Hacking by Kim

edited Oct 7, 2021 by Sarfaraz 746 views
0 votes
2 answers

does kali linux provide all services of ethical hacking in one application

Hey, @Vatsal, Almost all the services of ethical ...READ MORE

answered Apr 21, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,890 points

edited Oct 6, 2021 by Sarfaraz 339 views
0 votes
1 answer

What are the five steps of ethical hacking?

The 5 major steps involved in ethical ...READ MORE

answered Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,190 points

edited Oct 6, 2021 by Sarfaraz 5,698 views
0 votes
1 answer

How python is used in ethical hacking?

It is common practice amongst ethical hackers ...READ MORE

answered Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 59,190 points

edited Oct 7, 2021 by Sarfaraz 451 views
+1 vote
1 answer

How to get into cyber security domain?

The number of cyber-crimes is on an ...READ MORE

answered Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,190 points

edited Oct 7, 2021 by Sarfaraz 281 views
0 votes
1 answer

what is footprinting in ethical hacking?

Footprinting is a part of the Reconnaissance phase of ...READ MORE

answered Feb 3, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,190 points

edited Oct 6, 2021 by Sarfaraz 395 views
0 votes
1 answer

What is ethical hacking?

Hacking is referred to as the illegal ...READ MORE

answered Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,190 points

edited Oct 7, 2021 by Sarfaraz 283 views
webinar REGISTER FOR FREE WEBINAR X
REGISTER NOW
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP