Enumeration is the process of extracting user names, machine names, network resources, shares, and services from a system. Enumeration techniques are conducted in an intranet environment.

Objective

The objective of this lab is to provide expert knowledge on network enumeration and other responsibilities that include:
Learn about Network Enumeration
  • User name and user groups
  • Lists of computers, their operating systems, and ports
  • Machine names, network resources, and services
  • Lists of shares on individual hosts on the network
  • Policies and passwords

Scenario

During enumeration, information is systematically collected and individual systems are identified. The pen testers examine the systems in their entirety; this allows them to evaluate security weaknesses. In this lab we extract the information of NetBIOS information, user and group accounts, network shares, trusted domains, and services, which are either running or stopped. SuperScan detects open TCP and UDP ports on a target machine and determines which services are running on those ports. By using this information, an attacker can exploit the open port and hack your machine. As an expert ethical hacker and penetration tester, you need to enumerate target networks and extract lists of computers, user names, user groups, machine names, network resources, and services using various enumeration techniques.

Enumeration Exercises

Ethical Hacking Exercises / Enumeration contains the following Exercises:

  • Enumerating a Target Network using Nmap
  • Enumerating NetBIOS Using the SuperScan Tool
  • Enumerating NetBIOS Using the NetBIOS Enumerator Tool
  • Enumerating a Network Using SoftPerfect Network Scanner
  • Enumerating a Network Using SolarWinds Toolset
  • Enumerating the System using Hyena

The Virtual Private Cloud for this Lab set utilizes:


Ethical Hacking Exercises are available as part of the following subscription:

CEHproductimage

Each subscription provides 6 months access to over 75 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise.

Lab exercises are included for:

  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflow
  • Cryptography
Price: $199
Add to Cart
View Cart