Knowledge (XXG)

Network enumeration

Source 📝

33: 213:") hackers can, on entry of the network, get to security-sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments. 200:
used to retrieve usernames and info on groups, shares, and services of networked computers. This type of program scans networks for vulnerabilities in the security of that network. If there is a vulnerability with the security of the network, it will send a report back to a
205:
who may use this info to exploit that network glitch to gain entry to the network or for other malicious activities. Ethical hackers often also use the information to remove the glitches and strengthen their network.
171:
to gather information. It may also scan various ports on remote hosts for looking for well known services in an attempt to further identify the function of a remote host. The next stage of enumeration is to
270: 337: 353: 50: 168: 164: 116: 97: 69: 54: 76: 358: 173: 83: 202: 43: 220:
for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also,
65: 245: 148: 90: 255: 210: 265: 197: 177: 160: 152: 140: 275: 144: 308: 217: 156: 347: 225: 287: 17: 319: 32: 233: 229: 313: 136: 260: 163:. Network enumeration tends to use overt discovery protocols such as 221: 250: 307:
Gupta, Ajay; Klavinsky, Thomas; Laliberte, Scott (2002-03-15).
26: 309:"Security Through Penetration Testing: Internet Penetration" 155:
runs on them. Network enumeration is the discovery of
57:. Unsourced material may be challenged and removed. 271:Security Administrator Tool for Analyzing Networks 147:, which only retrieves information about which 143:are retrieved. It should not be confused with 151:are connected to a specific network and what 8: 139:and info on groups, shares, and services of 117:Learn how and when to remove this message 299: 216:Network enumerators are often used by 7: 55:adding citations to reliable sources 25: 135:is a computing activity in which 31: 42:needs additional citations for 1: 338:Identifying Web Applications 354:Hacking (computer security) 240:List of network enumerators 375: 340:by Fabian Mihailowitsch 66:"Network enumeration" 180:of the remote host. 51:improve this article 359:Wireless networking 141:networked computers 133:Network enumeration 18:Network enumerating 246:Metasploit Project 236:can be performed. 190:network enumerator 129:Computing activity 127: 126: 119: 101: 16:(Redirected from 366: 330: 329: 327: 326: 304: 266:SAINT (software) 198:computer program 178:operating system 159:or devices on a 153:operating system 122: 115: 111: 108: 102: 100: 59: 35: 27: 21: 374: 373: 369: 368: 367: 365: 364: 363: 344: 343: 334: 333: 324: 322: 306: 305: 301: 296: 284: 276:ZMap (software) 242: 209:Malicious (or " 194:network scanner 186: 145:network mapping 130: 123: 112: 106: 103: 60: 58: 48: 36: 23: 22: 15: 12: 11: 5: 372: 370: 362: 361: 356: 346: 345: 342: 341: 332: 331: 298: 297: 295: 292: 291: 290: 283: 280: 279: 278: 273: 268: 263: 258: 253: 248: 241: 238: 226:zone transfers 218:script kiddies 185: 182: 128: 125: 124: 39: 37: 30: 24: 14: 13: 10: 9: 6: 4: 3: 2: 371: 360: 357: 355: 352: 351: 349: 339: 336: 335: 321: 317: 315: 310: 303: 300: 293: 289: 286: 285: 281: 277: 274: 272: 269: 267: 264: 262: 259: 257: 254: 252: 249: 247: 244: 243: 239: 237: 235: 231: 227: 223: 219: 214: 212: 207: 204: 199: 195: 191: 183: 181: 179: 175: 170: 166: 162: 158: 154: 150: 146: 142: 138: 134: 121: 118: 110: 99: 96: 92: 89: 85: 82: 78: 75: 71: 68: –  67: 63: 62:Find sources: 56: 52: 46: 45: 40:This article 38: 34: 29: 28: 19: 323:. Retrieved 312: 302: 288:Service scan 215: 208: 193: 189: 187: 132: 131: 113: 104: 94: 87: 80: 73: 61: 49:Please help 44:verification 41: 320:Pearson PLC 230:ping sweeps 174:fingerprint 107:August 2022 348:Categories 325:2013-03-31 294:References 234:traceroute 77:newspapers 224:queries, 211:black-hat 137:usernames 314:InformIT 282:See also 184:Software 261:OpenVAS 196:) is a 161:network 149:servers 91:scholar 256:Nessus 232:, and 203:hacker 192:(also 93:  86:  79:  72:  64:  222:whois 157:hosts 98:JSTOR 84:books 316:.com 251:Nmap 176:the 169:SNMP 167:and 165:ICMP 70:news 53:by 350:: 318:. 311:. 228:, 188:A 328:. 120:) 114:( 109:) 105:( 95:· 88:· 81:· 74:· 47:. 20:)

Index

Network enumerating

verification
improve this article
adding citations to reliable sources
"Network enumeration"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
usernames
networked computers
network mapping
servers
operating system
hosts
network
ICMP
SNMP
fingerprint
operating system
computer program
hacker
black-hat
script kiddies
whois
zone transfers
ping sweeps

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.