What is enumeration in ethical hacking

0 votes
Can somebody explain regarding enumerations in the context of ethical hacking? Is it similar to enumerations in Java?
Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 19,620 points
3,469 views

1 answer to this question.

0 votes

Enumeration is a part of the first phase of ethical hacking which is information gathering.

It is a process where the attacker establishes an active connection with the target and tries to find as many factors possible, which could be used to carry out the attack.

This technique can be used to gain information on −

  • Network shares

  • SNMP data, if they are not secured properly

  • IP tables

  • Usernames of different systems

  • Passwords policies lists

It depend on the services that the systems offer that could include the following −

  • DNS enumeration

  • NTP enumeration

  • SNMP enumeration

  • Linux/Windows enumeration

  • SMB enumeration

Hope this helps!
To know more, join our Cybersecurity Training in Medan today.
answered Feb 3, 2020 by Sirajul
• 59,070 points

edited Oct 6 by Sarfaraz

Related Questions In Cyber Security & Ethical Hacking

0 votes
1 answer

What is the best books for hacking beginners to advace and also networking please refer good books ?

Here's the booklist for Ethical hacking for ...READ MORE

answered Apr 20, 2020 in Cyber Security & Ethical Hacking by Kim

edited Oct 7 by Sarfaraz 552 views
0 votes
2 answers

does kali linux provide all services of ethical hacking in one application

Hey, @Vatsal, Almost all the services of ethical ...READ MORE

answered Apr 21, 2020 in Cyber Security & Ethical Hacking by Gitika
• 65,950 points

edited Oct 6 by Sarfaraz 216 views
0 votes
1 answer
0 votes
1 answer

What is port forwarding??

Hey there! Port forwarding is a technique of ...READ MORE

answered May 27, 2019 in Cyber Security & Ethical Hacking by Omkar
• 69,170 points
190 views
0 votes
1 answer

What are the five steps of ethical hacking?

The 5 major steps involved in ethical ...READ MORE

answered Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,070 points

edited Oct 6 by Sarfaraz 5,084 views
0 votes
1 answer

How python is used in ethical hacking?

It is common practice amongst ethical hackers ...READ MORE

answered Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 59,070 points

edited Oct 7 by Sarfaraz 279 views
+1 vote
1 answer

How to get into cyber security domain?

The number of cyber-crimes is on an ...READ MORE

answered Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,070 points

edited Oct 7 by Sarfaraz 173 views
0 votes
1 answer

what is footprinting in ethical hacking?

Footprinting is a part of the Reconnaissance phase of ...READ MORE

answered Feb 3, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,070 points

edited Oct 6 by Sarfaraz 265 views
0 votes
1 answer

What is ethical hacking?

Hacking is referred to as the illegal ...READ MORE

answered Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,070 points

edited Oct 7 by Sarfaraz 172 views