Content deleted Content added
Undid revision 470640526 by 128.70.195.18 (talk) linkspam |
m Reverted edit by 2C0F:FE38:2321:636:D55A:BD71:BE4E:BB44 (talk) to last version by Discospinster |
||
(47 intermediate revisions by 27 users not shown) | |||
Line 1:
{{more citations needed|date=August 2022}}
'''Network enumerating''' is a computing activity in which user names, and info on groups, shares and services of networked computers are retrieved. It should not be confused with [[Network mapping]] which only retrieves information about which servers are connected to a specific network and what operating system is run on them. ▼
{{short description|Computing activity}}
▲'''Network
Network enumeration is the discovery of [[Host (network)|hosts]] or devices on a [[Computer network|network]]. Network enumeration tends to use overt discovery protocols such as [[Internet Control Message Protocol|ICMP]] and [[Simple Network Management Protocol|SNMP]] to gather information. It may also scan various ports on remote hosts for looking for well known services in an attempt to further identify the function of a remote host. The next stage of enumeration is to [[TCP/IP stack fingerprinting|fingerprint]] the [[operating system]] of the remote host.
==
A '''
Malicious (or "[[Black hat hacking|black-hat]]") hackers can, on entry of the network, get to security
Network enumerators are often used by [[script kiddies]] for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also, [[whois]] queries, [[zone transfer]]s, [[ping sweep]]s, and [[traceroute]] can be performed.
==
*
*
*[[Nessus (software)|Nessus]] *[[OpenVAS]]
*[[SAINT (software)]]
*[[Security Administrator Tool for Analyzing Networks]]
*[[ZMap (software)]]
==See also==
*[[Service scan]]
==
{{reflist}}
*[
[[Category:Hacking (computer security)]]
|