Enumeration is the process of extracting user names, machine names, network resources, shares, and services from a system. Enumeration techniques are conducted in an intranet environment.


The objective of this lab is to provide expert knowledge on network enumeration and other responsibilities that include:
Learn about Network Enumeration
  • User name and user groups
  • Lists of computers, their operating systems, and ports
  • Machine names, network resources, and services
  • Lists of shares on individual hosts on the network
  • Policies and passwords


During enumeration, information is systematically collected and individual systems are identified. The pen testers examine the systems in their entirety; this allows them to evaluate security weaknesses. In this lab we extract the information of NetBIOS information, user and group accounts, network shares, trusted domains, and services, which are either running or stopped. SuperScan detects open TCP and UDP ports on a target machine and determines which services are running on those ports. By using this information, an attacker can exploit the open port and hack your machine. As an expert ethical hacker and penetration tester, you need to enumerate target networks and extract lists of computers, user names, user groups, machine names, network resources, and services using various enumeration techniques.

Enumeration Exercises

Ethical Hacking Exercises / Enumeration contains the following Exercises:

  • Enumerating a Target Network using Nmap
  • Enumerating NetBIOS Using the SuperScan Tool
  • Enumerating NetBIOS Using the NetBIOS Enumerator Tool
  • Enumerating a Network Using SoftPerfect Network Scanner
  • Enumerating a Network Using SolarWinds Toolset
  • Enumerating the System using Hyena

The Virtual Private Cloud for this Lab set utilizes:

Ethical Hacking Exercises are available as part of the following subscription:


The Exercises in this lab map to the Certified Ethical Hacker V10 Course. Each subscription provides 6 months of access to 107 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise.

Lab exercises are included for:

  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Evading IDS Firewalls and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Cloud Computing
  • Cryptography
Price: $199
Add to Cart
View Cart

Buy Now