Difference between revisions of "Enumeration Techniques"

From wikieduonline
Jump to navigation Jump to search
Line 1: Line 1:
 
'''Enumeration''' is defined as the process of extracting user names, machine names, network resources, shares and services from a system. In this phase, the attacker creates an active connection to the system and performs directed queries to gain more information about the target. The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase.
 
'''Enumeration''' is defined as the process of extracting user names, machine names, network resources, shares and services from a system. In this phase, the attacker creates an active connection to the system and performs directed queries to gain more information about the target. The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase.
  
===See also===
+
==See also==
 
*{{Security}}
 
*{{Security}}
 
*{{Linux}}
 
*{{Linux}}
 
*[[Certified Ethical Hacker (CEH) Contents]]
 
*[[Certified Ethical Hacker (CEH) Contents]]

Revision as of 13:35, 4 April 2020

Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system. In this phase, the attacker creates an active connection to the system and performs directed queries to gain more information about the target. The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase.

See also

Advertising: