What is enumeration in ethical hacking

0 votes
Can somebody explain regarding enumerations in the context of ethical hacking? Is it similar to enumerations in Java?
Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 19,590 points
2,705 views

1 answer to this question.

0 votes

Enumeration is a part of the first phase of ethical hacking which is information gathering.

It is a process where the attacker establishes an active connection with the target and tries to find as many factors possible, which could be used to carry out the attack.

This technique can be used to gain information on −

  • Network shares

  • SNMP data, if they are not secured properly

  • IP tables

  • Usernames of different systems

  • Passwords policies lists

It depend on the services that the systems offer that could include the following −

  • DNS enumeration

  • NTP enumeration

  • SNMP enumeration

  • Linux/Windows enumeration

  • SMB enumeration

answered Feb 3, 2020 by Sirajul
• 59,030 points

Related Questions In Cyber Security & Ethical Hacking

0 votes
1 answer
0 votes
2 answers

does kali linux provide all services of ethical hacking in one application

Hey, @Vatsal, Almost all the services of ethical ...READ MORE

answered Apr 20, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,870 points
162 views
0 votes
1 answer
0 votes
1 answer

What is port forwarding??

Hey there! Port forwarding is a technique of ...READ MORE

answered May 27, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,110 points
158 views
0 votes
1 answer
0 votes
1 answer

How python is used in ethical hacking?

It is common practice amongst ethical hackers ...READ MORE

answered Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 59,030 points
203 views
+1 vote
1 answer

How to get into cyber security domain?

The number of cyber-crimes is on an ...READ MORE

answered Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,030 points
125 views
0 votes
1 answer
0 votes
1 answer

What is ethical hacking?

Hacking is referred to as the illegal ...READ MORE

answered Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,030 points
128 views