Skip to content

Enumeration

An active, methodical process of probing a target network or system to gather detailed information, such as usernames, network shares, services, and machine names (hostnames).

In another words, it can be understood as the gathering of information about a target.

It acts critically to allow crackers, hackers, or ethical hackers to map the target, identify vulnerabilities, and uncover potential attack vectors.


Uses protocols like SNMP, ICMP, and DNS to identify network topology, devices, and user acounts.

Exploits Windows networking protocols to find share names, file shares, and user information.

Uses tools like GoBuster to discover hidden files, directories, anda administrative portals.

Sistematically probes services like SMTP, LDAP, or FTP to identify valid users or software versios.


  • Nmap (with NSE scripts);

  • GoBuster;

  • SNMPWalk;

  • Dirbuster;

  • NetBios enumeration tools.

Turn off services like NetBIOS, SMB, and SNMP if they are not required.

Restrict access to ports used for enumeration, such and SNMP (161), DNS (53), and SSH (22).

Use strong, non-default passwords along to two-factor authentication to prevent brute-force enumeration attacks.

Patch systems to prevent attackers from using version information to identify vulnerabilities.


For more informations, check out this following links: