Enumeration belongs to the first phase of Ethical Hacking, i.e.,
“Information Gathering”. This is a process where the attacker
establishes an active connection with the victim and try to discover as
much attack vectors as possible, which can be used to exploit the
systems further.
Enumeration can be used to gain information on −
Take a look at the following example.
Enumeration can be used to gain information on −
- Network shares
- SNMP data, if they are not secured properly
- IP tables
- Usernames of different systems
- Passwords policies lists
- DNS enumeration
- NTP enumeration
- SNMP enumeration
- Linux/Windows enumeration
- SMB enumeration
NTP Suite
NTP Suite is used for NTP enumeration. This is important because in a network environment, you can find other primary servers that help the hosts to update their times and you can do it without authenticating the system.Take a look at the following example.
ntpdate 192.168.1.100 01 Sept 12:50:49 ntpdate[627]: adjust time server 192.168.1.100 offset 0.005030 sec or ntpdc [-ilnps] [-c command] [hostname/IP_address] root@test]# ntpdc -c sysinfo 192.168.1.100 ***Warning changing to older implementation ***Warning changing the request packet size from 160 to 48 system peer: 192.168.1.101 system peer mode: client leap indicator: 00 stratum: 5 precision: -15 root distance: 0.00107 s root dispersion: 0.02306 s reference ID: [192.168.1.101] reference time: f66s4f45.f633e130, Sept 01 2016 22:06:23.458 system flags: monitor ntp stats calibrate jitter: 0.000000 s stability: 4.256 ppm broadcastdelay: 0.003875 s authdelay: 0.000107 s
Comments
Post a Comment