04: Enumeration Overview In the enumeration phase, the attacker creates connections with the system to perform queries and retrieve information directly from it. Extractable information Network resources, shares, routing table, service settings, FQDN and SNMP details, hostname, users, groups, applications and banners. Enumeration techniques Estract username with email address Estract information with default password