Download presentation
Presentation is loading. Please wait.
Published byRachel Flowers Modified over 8 years ago
1
Enumeration March 2, 2010 MIS 4600 – MBA 5880 - © Abdou Illia
2
Objectives Discuss Enumeration and how it is accomplished Discuss enumerating Microsoft OS targets Discuss *NIX OS targets 2
3
What is Enumeration? 3 Security Testing Step to be performed after Discovering live targets >>[Scanning] Determining open ports and services hosted by discovered live targets >>[Scanning] Determining OS >> [Scanning] Process of extracting the following from targets Available resources or shares User/group names and password Enumeration is more intrusive than footprinting and scanning because you try to access resources Typically performed using Enumeration tools like NetBIOS names scanners Share scanners Vulnerability scanners such as Nessus 1. Footprinting 2. Scanning 3. Enumeration 4. Attack Searching vulnerabilities
4
Summary Questions 4
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.