CEHv8 BOOTCAMP: MODULE 04-ENUMERATION_SET-1 Flashcards
What does the attacker do in the Enumeration phase?
Create active connections to system and performs directed queries to gain more information about the target.
Why do attackers extract information?
To identify system attack points and perform password attacks to gain unauthorized access to information system resources.
Enumeration techniques are conducted in what kind of environment?
Intranet environment.
What are 6 enumeration techniques?
- Extract user names using email IDs
- Extract user names using SNMP
- Extract user groups from windows
- Extract information using default passwords
- Brute force active directory
- Extract information using DNS Zone Transfer
What service is UDP/TCP 53?
DNS Zone Transfer
What service is UDP/TCP 135?
MS RPC Endpoint Mapper
What service is UDP/TCP 137?
NetBIOS Name Service (NBNS)
What service is UDP/TCP 139?
NetBIOS Session Service (SMB Over)
What service is TCP 445?
SMB Over TCP (Direct Host)
What service is UDP 161?
Simple Network Management Protocol (SNMP)
What service is UDP/TCP 389?
Lightweight Direct Access Protocol (LDAP)
What service is UDP/TCP 3368?
Global Catalog Service
What service is TCP 25?
Simple Mail Transfer Protocol (SMTP)
What service is UDP/TCP 162?
SNMP Trap
NetBIOS is a unique 16 ASCII character string used to identify what?
Identify the network devices over TCP/IP.