04: Enumeration

Overview

In the phase, the attacker creates connections with the system to perform queries and retrieve information directly from it.

Extractable information

Network resources, shares, routing table, service settings, FQDN and SNMP details, hostname, users, groups, applications and banners.

Enumeration techniques

  • Estract username with email address
  • Estract information…