Network enumeration: Difference between revisions

Content deleted Content added
Tags: Reverted references removed Visual edit
m Reverted edits by 2C0F:FE38:2321:636:6865:B9A2:8851:95D4 (talk) (HG) (3.4.13)
Line 5:
 
==Software==
A '''network enumerator''' (also '''network scanner''') is a [[computer program]] used to retrieve usernames and info on groups, shares, and services of networked computers. This type of program scans networks for vulnerabilities in the security of that network. If there is a vulnerability with the security of the network, it will send a report back to a [[hacker (computer security)|hacker]] who may use this info to exploit that network glitch to gain entry to the network or for other malicious activities. Ethical hackers often also use the information to remove the glitches and strengthbcstrengthen jhjnsd\jcdsbjhbvhshdchhsdvcsgvcgvvxtheir vxv rnet Penetration|first1=Ajay|last1=Gupta|first2=Thomas|last2=Klavinsky|first3=Scott|last3=Laliberte|website=[[InformIT]]network.com|publisher=[[Pearson PLC]]|date=2002-03-15|accessdate=2013-03-31}}</ref>
 
Malicious (or "[[Black hat hacking|black-hat]]") hackers can, on entry of the network, get to security-sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
 
Network enumerators are often used by [[script kiddies]] for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also, [[whois]] queries, [[zone transfer]]s, [[ping sweep]]s, and [[traceroute]] can be performed.<ref>{{cite web|url=http://www.informit.com/articles/article.aspx?p=25916|title=Security Through Penetration Testing: Internet Penetration|first1=Ajay|last1=Gupta|first2=Thomas|last2=Klavinsky|first3=Scott|last3=Laliberte|website=[[InformIT]].com|publisher=[[Pearson PLC]]|date=2002-03-15|accessdate=2013-03-31}}</ref>
 
==List of network enumerators==