Enumeration

The following is a list of guidelines for performing enumeration on a target system:

  1. Determine the network range and calculate the subnet mask.
  2. Perform host discovery.
  3. Perform port scanning.
  1. Perform SMB and NetBIOS enumeration techniques.
  2. Perform LDAP enumeration.
  3. Perform DNS enumeration.

In the next section, we will take a look at an exploitation checklist.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.108.11