Week 5
On our fifth session on ethical hacking and penetration testing, our main topic was about enumerating target and the tools we are going to use to enumerate target. We were told about the information we could extract by performing enumeration (resources or shares on the network, user names or groups assigned on the network, last time user logged on, user’s password). We were introduced with some tools such as NBTscan, Hyena, DumpSec, etc. We were also explained about the advantages and disadvantages of each tool we were introduced with, and what the results would look like after the enumerating process. On our fifth session, we were expected to enumerate the user technical identity, explain the different nmap scanning options from the TCP/IP perspective, understanding how to use enumeration in an effective way.
Category: Uncategorized
You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
Leave a Reply

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>