Enumeration
Involves systematically gathering information about a target's network, systems, and applications, focusing on extracting detailed data such as user accounts, network shares, open ports, and system settings, which can be leveraged to gain further access.
It is also done after gaining access to a shell in the target machine in the exploitation phase, which is named internal enumeration.
The resources we could look for are organized into three principal categories:
OS-based: OS type, configuration files, sensitive files, network interfaces and configuration, users, groups, permissions, privileges, restrictions, environment variables, kernel info, hidden files
Host-based: Processes, tasks, sources and destinations, accessible services, ports, protocols, version and configuration
Infrastructure-based: Firewalls, proxies, IDS/IPS, EDR, VPN, Cloudflare, domains and subdomains, IP addresses, cloud instances, NetBlocks
Last updated
Was this helpful?