Enumeration is fundamentally checking. An attacker sets up a functioning associated with the objective host. The weaknesses are then tallied and evaluated. It is done mostly to look for assaults and dangers to the objective framework. Enumeration is utilized to gather usernames, hostnames, IP addresses, passwords, arrangements, and so on.
At the point when a functioning connection with the objective host is set up, hackers oversee the objective framework. They at that point take private data and information. Now and again, aggressors have additionally been discovered changing the setup of the objective frameworks.
How the connection is set up to the host decides the information or data the attacker will have the option to get to.
Types Of Enumeration
In this section, we will be discussing the various types of Enumerations.
- NetBIOS(Network Basic Input Output System) Enumeration:
- NetBIOS name is an exceptional 16 ASCII character string used to distinguish the organization gadgets over TCP/IP, 15 characters are utilized for the gadget name and the sixteenth character is saved for the administration or name record type.
- Programmers utilize the NetBIOS enumeration to get a rundown of PCs that have a place with a specific domain, a rundown of offers on the individual hosts in the organization, and strategies and passwords.
- NetBIOS name goal isn’t supported by Microsoft for Internet Protocol Version 6.
- The initial phase in specifying a Windows framework is to exploit the NetBIOS API. It was initially an Application Programming Interface(API) for custom programming to get to LAN assets. Windows utilizes NetBIOS for document and printer sharing.
- A hacker who finds a Windows OS with port 139 open, can verify what assets can be gotten to or seen on the far-off framework. In any case, to count the NetBIOS names, the distant framework probably empowered document and printer sharing. This sort of enumeration may empower the programmer to peruse or keep in touch with the distant PC framework, contingent upon the accessibility of offers, or dispatch a DoS.
- NetBIOS name list:
NameNetBIOS CodeType<host name><00>UNIQUE<domain><00>GROUP<host name><03>UNIQUE<username><03>UNIQUE<host name><20>UNIQUE<domain><1D>GROUP<domain><1B>UNIQUE
- nbtstat Utility: In Windows, it shows NetBIOS over TCP/IP (NetBT) convention insights, NetBIOS name tables for both the neighborhood and distant PCs, and the NetBIOS name reserve. This utility allows a resuscitate of the NetBIOS name cache and the names selected with Windows Internet Name Service. The sentence structure for Nbtstat: