Enumeration Tools Flashcards
Process to identify and scan network ranges and hosts belonging to the target and
map out an attack surface
Enumeration
A connection is made from the attacker to a target and data is
transmitted
Active
No connection is made from the attacker to a target and data
collected can be analyzed
Network sniffers are considered a passive form of enumeration
Wireshark
Zeek or Bro
p0f
Passive
Tools that map out the layout of a network, typically in terms of IP address usage,
routing topology, and DNS namespace (subdomains and hostnames)
Footprinting
Tools that perform host system detection to map out open ports, OS type and
version, file shares, running services and applications, system uptime, and other
useful metadata
Fingerprinting
A versatile port scanner used for topology, host, service, and OS discovery and
enumeration
A nmap discovery scan is used to footprint the network
Nmap Security Scanner
Lists the IP addresses from the supplied target range(s) and performs a
reverse-DNS query to discover any host names associated with those
IPs
List Scan (-sL)
Probes specific ports from the given list using a TCP SYN packet instead
of an ICMP packet to conduct the ping
TCP SYN ping (-PS <PortList>)</PortList>
Issues probes with significant delays to become stealthier and avoid
detection by an IDS or IPS
Sparse Scanning (–scan-delay <Time>)</Time>
Issues probes with using a timing pattern with n being the pattern to
utilize (0 is slowest and 5 is fastest)
Scan Timing (-Tn)
A technique that splits the TCP header of each probe between multiple
IP datagrams to make it hard for an IDS or IPS to detect
Fragmentation (-f or –mtu)
After your footprinting is complete, it is time to begin fingerprinting hosts
Nmap Port Scans
Conducts a half-open scan by sending a SYN packet to identify the port
state without sending an ACK packet afterwards
TCP SYN (-sS)
Conducts a three-way handshake scan by sending a SYN packet to
identify the port state and then sending an ACK packet once the SYNACK is received
TCP Connect (-sT)
Conducts a scan by sending a packet with the header bit set to zero
Null Scan (-sN)