What is enumeration in ethical hacking

0 votes
Can somebody explain regarding enumerations in the context of ethical hacking? Is it similar to enumerations in Java?
Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 19,620 points
3,409 views

1 answer to this question.

0 votes

Enumeration is a part of the first phase of ethical hacking which is information gathering.

It is a process where the attacker establishes an active connection with the target and tries to find as many factors possible, which could be used to carry out the attack.

This technique can be used to gain information on −

  • Network shares

  • SNMP data, if they are not secured properly

  • IP tables

  • Usernames of different systems

  • Passwords policies lists

It depend on the services that the systems offer that could include the following −

  • DNS enumeration

  • NTP enumeration

  • SNMP enumeration

  • Linux/Windows enumeration

  • SMB enumeration

answered Feb 3, 2020 by Sirajul
• 59,070 points

Related Questions In Cyber Security & Ethical Hacking

0 votes
1 answer
0 votes
2 answers

does kali linux provide all services of ethical hacking in one application

Hey, @Vatsal, Almost all the services of ethical ...READ MORE

answered Apr 20, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,950 points
207 views
0 votes
1 answer
0 votes
1 answer

What is port forwarding??

Hey there! Port forwarding is a technique of ...READ MORE

answered May 27, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,170 points
189 views
0 votes
1 answer
0 votes
1 answer

How python is used in ethical hacking?

It is common practice amongst ethical hackers ...READ MORE

answered Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 59,070 points
269 views
+1 vote
1 answer

How to get into cyber security domain?

The number of cyber-crimes is on an ...READ MORE

answered Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,070 points
168 views
0 votes
1 answer
0 votes
1 answer

What is ethical hacking?

Hacking is referred to as the illegal ...READ MORE

answered Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,070 points
167 views