Temple University

Week 5 Summary

The War Is On:
Enumeration can help with discovering network resources, users, groups, banner grabbing, and operating system footprinting. There are different enumeration techniques depending on if your target is a Windows box or a Linux box. The enumeration tools assist in gathering the target’s NetBIOS name, what ports are open, what operating system is running, what users have been logging into the box, locations, and view the registry. Enumeration is useful since it gathers additional information on the target that is essential for selecting the right exploit and post exploitation techniques.

Footprinting:

Open source information is one of the easiest way to start footprinting. Information available online includes phone numbers, locations, types of systems, email addresses, physical addresses, and any carelessly posted documents. Network enumeration involves mapping out the target network through DNS zone transfers, matching IP addresses of computers, servers, domain controllers and websites to IP addresses, identifying the operating systems on the machines, seeing what machines are alive and can respond to TCP, UDP, or ICMP requests, and what the firewall will accept or block. Also useful is taking advantage of SNMP to discover their whole network map and activity.

Question for the class:

Are there any tools besides Enum4Linux that wraps up many enumeration tools into one tool?

Article:

The federal government claims it is not their responsibility to warn OPM when OPM had been hacked.
http://www.cnn.com/2015/09/17/politics/opm-hack-director-national-intelligence-response-wyden/index.html

Leave a Reply

Your email address will not be published. Required fields are marked *