What is enumeration in ethical hacking

0 votes
Can somebody explain regarding enumerations in the context of ethical hacking? Is it similar to enumerations in Java?
Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 19,600 points
3,806 views

1 answer to this question.

0 votes

Enumeration is a part of the first phase of ethical hacking which is information gathering.

It is a process where the attacker establishes an active connection with the target and tries to find as many factors possible, which could be used to carry out the attack.

This technique can be used to gain information on −

  • Network shares

  • SNMP data, if they are not secured properly

  • IP tables

  • Usernames of different systems

  • Passwords policies lists

It depend on the services that the systems offer that could include the following −

  • DNS enumeration

  • NTP enumeration

  • SNMP enumeration

  • Linux/Windows enumeration

  • SMB enumeration

Hope this helps!
To know more, join our Cybersecurity Training in Medan today.
answered Feb 3, 2020 by Sirajul
• 59,170 points

edited Oct 6, 2021 by Sarfaraz

Related Questions In Cyber Security & Ethical Hacking

0 votes
1 answer

What is hacking in cyber security?

Hacking refers to the misuse of devices ...READ MORE

answered Dec 14, 2021 in Cyber Security & Ethical Hacking by Aditi
• 300 points
46 views
0 votes
1 answer

what is hacking in cyber security

An effort to attack a computer system ...READ MORE

answered Jan 31 in Cyber Security & Ethical Hacking by Edureka
• 5,460 points
74 views
0 votes
1 answer

What is the best books for hacking beginners to advace and also networking please refer good books ?

Here's the booklist for Ethical hacking for ...READ MORE

answered Apr 20, 2020 in Cyber Security & Ethical Hacking by Kim

edited Oct 7, 2021 by Sarfaraz 637 views
0 votes
2 answers

does kali linux provide all services of ethical hacking in one application

Hey, @Vatsal, Almost all the services of ethical ...READ MORE

answered Apr 21, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,850 points

edited Oct 6, 2021 by Sarfaraz 271 views
0 votes
1 answer

What are the five steps of ethical hacking?

The 5 major steps involved in ethical ...READ MORE

answered Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,170 points

edited Oct 6, 2021 by Sarfaraz 5,468 views
0 votes
1 answer

How python is used in ethical hacking?

It is common practice amongst ethical hackers ...READ MORE

answered Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 59,170 points

edited Oct 7, 2021 by Sarfaraz 355 views
+1 vote
1 answer

How to get into cyber security domain?

The number of cyber-crimes is on an ...READ MORE

answered Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,170 points

edited Oct 7, 2021 by Sarfaraz 216 views
0 votes
1 answer

what is footprinting in ethical hacking?

Footprinting is a part of the Reconnaissance phase of ...READ MORE

answered Feb 3, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,170 points

edited Oct 6, 2021 by Sarfaraz 318 views
0 votes
1 answer

What is ethical hacking?

Hacking is referred to as the illegal ...READ MORE

answered Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,170 points

edited Oct 7, 2021 by Sarfaraz 218 views
webinar REGISTER FOR FREE WEBINAR X
Send OTP
REGISTER NOW
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP