Open In App

Cyber Security – Types of Enumeration

Enumeration is fundamentally checking. An attacker sets up a functioning associated with the objective host. The weaknesses are then tallied and evaluated. It is done mostly to look for assaults and dangers to the objective framework. Enumeration is utilized to gather usernames, hostname, IP addresses, passwords, arrangements, and so on. At the point when a functioning connection with the objective host is set up, hackers oversee the objective framework. They at that point take private data and information. Now and again, aggressors have additionally been discovered changing the setup of the objective frameworks. The manner in which the connection is set up to the host decides the information or data the attacker will have the option to get to.

Types Of Enumeration

In this section, we will be discussing the various types of Enumerations.

1. NetBIOS(Network Basic Input Output System) Enumeration: 

Name NetBIOS Code Type
<host name> <00> UNIQUE
<domain> <00> GROUP
<host name> <03> UNIQUE
<username> <03> UNIQUE
<host name> <20> UNIQUE
<domain> <1D> GROUP
<domain> <1B> UNIQUE
nbtstat [-a RemoteName] [-A IPAddress] [-c] [-n] [-r] [-R] [-RR] [-s] [-S] [Interval]

The table appeared beneath shows different Nbtstat boundaries:

Parameters
-a RemoteName
-A IPAddress
-c
-n
-r
-RR
-s
-S
Interval

2. SNMP(Simple Network Management Protocol) Enumeration: 

Given below is the communication between the SNMP agent and manager:

3. LDAP Enumeration:

4. NTP Enumeration:

5. SMTP Enumeration:

6. DNS Enumeration using Zone Transfer:

7. IPsec Enumeration:

8. VoIP(Voice over IP) Enumeration:

9. RPC Enumeration:

10. Unix/Linux User Enumeration:

11. SMB Enumeration:

Mitigation Of Different Types Of Enumeration

There are several countermeasures which can be taken into account for the mitigation of several kinds of enumeration:

1. NetBIOS Enumeration:

2. SNMP Enumeration:

3. LDAP Enumeration:

4. NTP Enumeration:

5. SMTP Enumeration:

6. DNS Enumeration Using Zone Transfer:

7. IPsec Enumeration:

8. VoIP(Voice over IP) Enumeration:

9. RPC Enumeration:

10. Unix/Linux User Enumeration:

11. SMB Enumeration:


Article Tags :