The following is a list of guidelines for performing enumeration on a target system:
- Determine the network range and calculate the subnet mask.
- Perform host discovery.
- Perform port scanning.
- Perform SMB and NetBIOS enumeration techniques.
- Perform LDAP enumeration.
- Perform DNS enumeration.
In the next section, we will take a look at an exploitation checklist.