Network enumeration: Difference between revisions

Content deleted Content added
No edit summary
m Reverted edit by 2C0F:FE38:2321:636:D55A:BD71:BE4E:BB44 (talk) to last version by Discospinster
 
(44 intermediate revisions by 26 users not shown)
Line 1:
{{more citations needed|date=August 2022}}
'''Network enumerating''' is a computing activity in which user names, and info on groups, shares and services of networked computers are retrieved. It should not be confused with [[network mapping]] which only retrieves information about which servers are connected to a specific network and what operating system is run on them.
{{short description|Computing activity}}
'''Network enumeratingenumeration''' is a computing activity in which user names,[[username]]s and info on groups, shares, and services of [[computer network|networked computers]] are retrieved. It should not be confused with [[network mapping]], which only retrieves information about which [[server (computing)|servers]] are connected to a specific network and what [[operating system]] is runruns on them.
Network enumeration is the discovery of [[Host (network)|hosts]] or devices on a [[Computer network|network]]. Network enumeration tends to use overt discovery protocols such as [[Internet Control Message Protocol|ICMP]] and [[Simple Network Management Protocol|SNMP]] to gather information. It may also scan various ports on remote hosts for looking for well known services in an attempt to further identify the function of a remote host. The next stage of enumeration is to [[TCP/IP stack fingerprinting|fingerprint]] the [[operating system]] of the remote host.
 
== Software ==
A '''network enumerator''' or(also '''network scanner''') is a [[computer program]] used to retrieve user names,usernames and info on groups, shares, and services of networked computers. This type of program scans [[Computer network|network]]snetworks for vulnerabilities in the security of that network. If there is a vulnerability with the security of the network, it will send a report back to a [[Hackerhacker (computer security)|hacker]] who may use this info to exploit that network glitch to gain entry to the network or for other malicious activities. Ethical hackers often also use the information to remove the glitches and strengthen their network.
 
Malicious (or "[[Black hat hacking|black-hat]]") hackers can, on entry of the network, get to security -sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
 
Network enumerators are often used by [[script kiddies]] for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also, [[whois]] queries, [[zone transfer]]s, [[ping sweep]]s, and [[traceroute]] can be performed. <ref>[{{cite web|url=http://www.informit.com/articles/article.aspx?p=25916|title=Security NetworkThrough enumeratingPenetration Testing: Internet Penetration|first1=Ajay|last1=Gupta|first2=Thomas|last2=Klavinsky|first3=Scott|last3=Laliberte|website=[[InformIT]].com|publisher=[[Pearson PLC]]|date=2002-03-15|accessdate=2013-03-31}}</ref>
 
==PopularList Open Sourceof network enumerators==
* [[NmapMetasploit Project]]
* [[Nmap]]
*[[Nessus (software)|Nessus]]
*[[OpenVAS]]
*[[SAINT (software)]]
*[[Security Administrator Tool for Analyzing Networks]]
*[[ZMap (software)]]
 
==See also==
*[[Service scan]]
 
== References ==
{{reflist}}
*[httphttps://events.ccc.de/congress/2011/Fahrplan/attachments/2024_Dont_scan_just_ask_Fabian_Mihailowitsch.pdf Identifying Web Applications] by Fabian Mihailowitsch
 
 
 
[[Category:Hacking (computer security)]]