Content deleted Content added
No edit summary |
m Reverted edit by 2C0F:FE38:2321:636:D55A:BD71:BE4E:BB44 (talk) to last version by Discospinster |
||
(28 intermediate revisions by 22 users not shown) | |||
Line 1:
{{more citations needed|date=August 2022}}
'''Network enumeration''' is a computing activity in which [[username]]s and info on groups, shares, and services of [[computer network|networked computers]] are retrieved. It should not be confused with [[network mapping]], which only retrieves information about which [[server (computing)|servers]] are connected to a specific network and what [[operating system]] run on them. ▼
{{short description|Computing activity}}
▲'''Network enumeration''' is a computing activity in which [[username]]s and info on groups, shares, and services of [[computer network|networked computers]] are retrieved. It should not be confused with [[network mapping]], which only retrieves information about which [[server (computing)|servers]] are connected to a specific network and what [[operating system]]
Network enumeration is the discovery of [[Host (network)|hosts]] or devices on a [[Computer network|network]]. Network enumeration tends to use overt discovery protocols such as [[Internet Control Message Protocol|ICMP]] and [[Simple Network Management Protocol|SNMP]] to gather information. It may also scan various ports on remote hosts for looking for well known services in an attempt to further identify the function of a remote host. The next stage of enumeration is to [[TCP/IP stack fingerprinting|fingerprint]] the [[operating system]] of the remote host.
==
A '''network enumerator'''
Malicious (or "[[Black hat hacking|black-hat]]") hackers can, on entry of the network, get to security-sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
Network enumerators are often used by [[script kiddies]] for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also, [[whois]] queries, [[zone transfer]]s, [[ping sweep]]s, and [[traceroute]] can be performed.
==
*
*
*[[Nessus (software)|Nessus]] *[[OpenVAS]]
*[[SAINT (software)]]
*[[Security Administrator Tool for Analyzing Networks]]
*[[ZMap (software)]]
==See also==
*[[Service scan]]
==
{{reflist}}
*[
[[Category:Hacking (computer security)]]
[[Category:Wireless networking]]
|