Presentation is loading. Please wait.

Presentation is loading. Please wait.

Enumeration March 2, 2010 MIS 4600 – MBA 5880 - © Abdou Illia.

Similar presentations


Presentation on theme: "Enumeration March 2, 2010 MIS 4600 – MBA 5880 - © Abdou Illia."— Presentation transcript:

1 Enumeration March 2, 2010 MIS 4600 – MBA 5880 - © Abdou Illia

2 Objectives  Discuss Enumeration and how it is accomplished  Discuss enumerating Microsoft OS targets  Discuss *NIX OS targets 2

3 What is Enumeration? 3  Security Testing Step to be performed after  Discovering live targets >>[Scanning]  Determining open ports and services hosted by discovered live targets >>[Scanning]  Determining OS >> [Scanning]  Process of extracting the following from targets  Available resources or shares  User/group names and password  Enumeration is more intrusive than footprinting and scanning because you try to access resources  Typically performed using Enumeration tools like  NetBIOS names scanners  Share scanners  Vulnerability scanners such as Nessus 1. Footprinting 2. Scanning 3. Enumeration 4. Attack Searching vulnerabilities

4 Summary Questions 4


Download ppt "Enumeration March 2, 2010 MIS 4600 – MBA 5880 - © Abdou Illia."

Similar presentations


Ads by Google