Enumeration
The attacker’s objective is to identify the valid user’s accounts or
groups where he/she can remain inconspicuous once the system has been
compromised. Enumeration involves making active connections to the
target system or subjecting it to direct queries.
The module “Enumeration” explains about the process of
extracting the user names. It explains the techniques for Enumeration,
enumerating user accounts, SNMP enumeration, UNIX/Linux enumeration,
LDAP enumeration, NTP enumeration, SMTP enumeration, DNS enumeration,
and web enumeration. The module lists the enumeration tools that can be
used to extract the data.