Content deleted Content added
No edit summary |
m Reverted edit by 2C0F:FE38:2321:636:D55A:BD71:BE4E:BB44 (talk) to last version by Discospinster |
||
(5 intermediate revisions by 5 users not shown) | |||
Line 1:
{{more citations needed|date=August 2022}}
{{short description|Computing activity}}
'''Network enumeration''' is a computing activity in which [[username]]s and info on groups, shares, and services of [[computer network|networked computers]] are retrieved. It should not be confused with [[network mapping]], which only retrieves information about which [[server (computing)|servers]] are connected to a specific network and what [[operating system]] runs on them.
Line 4 ⟶ 5:
==Software==
A '''network enumerator'''
Malicious (or "[[Black hat hacking|black-hat]]") hackers can, on entry of the network, get to security-sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
|