Content deleted Content added
No edit summary Tags: Mobile edit Mobile web edit |
m Reverted edit by 2C0F:FE38:2321:636:D55A:BD71:BE4E:BB44 (talk) to last version by Discospinster |
||
(15 intermediate revisions by 10 users not shown) | |||
Line 1:
{{more citations needed|date=August 2022}}
{{short description|Computing activity}}
'''Network enumeration''' is a computing activity in which [[username]]s and info on groups, shares, and services of [[computer network|networked computers]] are retrieved. It should not be confused with [[network mapping]], which only retrieves information about which [[server (computing)|servers]] are connected to a specific network and what [[operating system]] runs on them.
Network
▲Network Enumeration is the discovery of [[Host (computing)|host]]s/devices on a [[Computer network|network]]. Network Enumeration tends to use overt discovery protocols such as [[Internet Control Message Protocol|ICMP]] and [[Simple Network Management Protocol|SNMP]] to gather information. It may also scan various ports on remote hosts for looking for well known services in an attempt to further identify the function of a remote host. The next stage of enumeration is to [[TCP/IP stack fingerprinting|fingerprint]] the [[Operating System]] of the remote host
==
A '''network enumerator'''
Malicious (or "[[Black hat hacking|black-hat]]") hackers can, on entry of the network, get to security-sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
Network enumerators are often used by [[script kiddies]] for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also, [[whois]] queries, [[zone transfer]]s, [[ping sweep]]s, and [[traceroute]] can be performed.<ref>{{cite web|url=http://www.informit.com/articles/article.aspx?p=25916|title=Security Through Penetration Testing: Internet Penetration|
==
*
*
*[[Nessus (software)|Nessus]] *[[OpenVAS]]
*[[SAINT (software)]]
*[[Security Administrator Tool for Analyzing Networks]]
*[[ZMap (software)]]
==See also==
*[[Service scan]]
==
{{reflist}}
*[https://events.ccc.de/congress/2011/Fahrplan/attachments/2024_Dont_scan_just_ask_Fabian_Mihailowitsch.pdf Identifying Web Applications] by Fabian Mihailowitsch
|