Network enumeration: Difference between revisions

Content deleted Content added
wikil
use cite templ
Line 6:
Malicious (or "[[Black hat hacking|black-hat]]") hackers can, on entry of the network, get to security sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
 
Network enumerators are often used by [[script kiddies]] for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also, [[whois]] queries, [[zone transfer]]s, [[ping sweep]]s and [[traceroute]] can be performed. <ref>[{{cite web|url=http://www.informit.com/articles/article.aspx?p=25916|title=Security NetworkThrough enumerating]Penetration Testing: Internet Penetration|authors=Ajay Gupta, Thomas Klavinsky, and Scott Laliberte|work=InformIT|publisher=Pearson PLC|date=2002-03-15|accessdate=2013-03-31}}</ref>
 
==Popular open source network enumerators==
Line 18:
{{reflist}}
*[http://events.ccc.de/congress/2011/Fahrplan/attachments/2024_Dont_scan_just_ask_Fabian_Mihailowitsch.pdf Identifying Web Applications] by Fabian Mihailowitsch
 
 
 
[[Category:Hacking (computer security)]]