33:
213:") hackers can, on entry of the network, get to security-sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
200:
used to retrieve usernames and info on groups, shares, and services of networked computers. This type of program scans networks for vulnerabilities in the security of that network. If there is a vulnerability with the security of the network, it will send a report back to a
205:
who may use this info to exploit that network glitch to gain entry to the network or for other malicious activities. Ethical hackers often also use the information to remove the glitches and strengthen their network.
171:
to gather information. It may also scan various ports on remote hosts for looking for well known services in an attempt to further identify the function of a remote host. The next stage of enumeration is to
270:
337:
353:
50:
168:
164:
116:
97:
69:
54:
76:
358:
173:
83:
202:
43:
220:
for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also,
65:
245:
148:
90:
255:
210:
265:
197:
177:
160:
152:
140:
275:
144:
308:
217:
156:
347:
225:
287:
17:
319:
32:
233:
229:
313:
136:
260:
163:. Network enumeration tends to use overt discovery protocols such as
221:
250:
307:
Gupta, Ajay; Klavinsky, Thomas; Laliberte, Scott (2002-03-15).
26:
309:"Security Through Penetration Testing: Internet Penetration"
155:
runs on them. Network enumeration is the discovery of
57:. Unsourced material may be challenged and removed.
271:Security Administrator Tool for Analyzing Networks
147:, which only retrieves information about which
143:are retrieved. It should not be confused with
151:are connected to a specific network and what
8:
139:and info on groups, shares, and services of
117:Learn how and when to remove this message
299:
216:Network enumerators are often used by
7:
55:adding citations to reliable sources
25:
135:is a computing activity in which
31:
42:needs additional citations for
1:
338:Identifying Web Applications
354:Hacking (computer security)
240:List of network enumerators
375:
340:by Fabian Mihailowitsch
66:"Network enumeration"
180:of the remote host.
51:improve this article
359:Wireless networking
141:networked computers
133:Network enumeration
18:Network enumerating
246:Metasploit Project
236:can be performed.
190:network enumerator
129:Computing activity
127:
126:
119:
101:
16:(Redirected from
366:
330:
329:
327:
326:
304:
266:SAINT (software)
198:computer program
178:operating system
159:or devices on a
153:operating system
122:
115:
111:
108:
102:
100:
59:
35:
27:
21:
374:
373:
369:
368:
367:
365:
364:
363:
344:
343:
334:
333:
324:
322:
306:
305:
301:
296:
284:
276:ZMap (software)
242:
209:Malicious (or "
194:network scanner
186:
145:network mapping
130:
123:
112:
106:
103:
60:
58:
48:
36:
23:
22:
15:
12:
11:
5:
372:
370:
362:
361:
356:
346:
345:
342:
341:
332:
331:
298:
297:
295:
292:
291:
290:
283:
280:
279:
278:
273:
268:
263:
258:
253:
248:
241:
238:
226:zone transfers
218:script kiddies
185:
182:
128:
125:
124:
39:
37:
30:
24:
14:
13:
10:
9:
6:
4:
3:
2:
371:
360:
357:
355:
352:
351:
349:
339:
336:
335:
321:
317:
315:
310:
303:
300:
293:
289:
286:
285:
281:
277:
274:
272:
269:
267:
264:
262:
259:
257:
254:
252:
249:
247:
244:
243:
239:
237:
235:
231:
227:
223:
219:
214:
212:
207:
204:
199:
195:
191:
183:
181:
179:
175:
170:
166:
162:
158:
154:
150:
146:
142:
138:
134:
121:
118:
110:
99:
96:
92:
89:
85:
82:
78:
75:
71:
68: –
67:
63:
62:Find sources:
56:
52:
46:
45:
40:This article
38:
34:
29:
28:
19:
323:. Retrieved
312:
302:
288:Service scan
215:
208:
193:
189:
187:
132:
131:
113:
104:
94:
87:
80:
73:
61:
49:Please help
44:verification
41:
320:Pearson PLC
230:ping sweeps
174:fingerprint
107:August 2022
348:Categories
325:2013-03-31
294:References
234:traceroute
77:newspapers
224:queries,
211:black-hat
137:usernames
314:InformIT
282:See also
184:Software
261:OpenVAS
196:) is a
161:network
149:servers
91:scholar
256:Nessus
232:, and
203:hacker
192:(also
93:
86:
79:
72:
64:
222:whois
157:hosts
98:JSTOR
84:books
316:.com
251:Nmap
176:the
169:SNMP
167:and
165:ICMP
70:news
53:by
350::
318:.
311:.
228:,
188:A
328:.
120:)
114:(
109:)
105:(
95:·
88:·
81:·
74:·
47:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.