Enumeration: Introduction
Hey everyone! It's incredible to hear back from so many of you already. 4 blog posts in, I can already feel the love.
I did go back this week and add a disclaimer to all posts. First, I wanted to ensure that folks are being careful with using the skills within the resources. Second, I just wanted to explain that this entire series is really about learning topics thoroughly, however you need to learn. As someone who is a multimodal learner, I'm actually using the resources in these posts to understand these topics as fully as I can.
Let's get into enumeration. Taking directly from the company RedTeam Security, "Enumeration is the method that a penetration tester uses to identify information about in-scope assets. A pen tester will use an automated process to identify all active IP addresses within the scope and some limited information about those devices, such as type and operating system version. This information is then used for further automated and manual testing. Enumeration can happen several times within a single pen test on different parts of a network. A bad actor will also use enumeration to identify systems to compromise." Directly after this blog I'll move into the various types of enumeration in the next posts, which include:
NetBios enumeration
SNMP enumeration
LDAP enumeration
NTP enumeration
SMTP enumeration
DNS enumeration
Windows enumeration
UNIX/Linux enumeration
Visual:
I really liked this video and subscribed to this channel because of his ability to teach visually. Some of the videos are a little bit older, so just keep in mind that some of the technology might have changed, it looks like the methodologies are still legit.In looking for other resources for visual, I realized that this 9 minute clip satisfied the basics of the topic for me. If you feel you need more, try googling things like "pentesting enumeration flow chart" or "enumeration security white board" and see what you come up with!
PS if you are really digging the whiteboarding, here's a bookmark for you - SANS Poster - White Board of Awesome Command Line Kung FuAural:
There are some great videos here, I did find Hackersploit's really easy to listen to, found here:
Read/Write:
One of the easiest readings I digested about enumeration was written by Raghu Chakravartula, simply titled "What is enumeration? [updated 2021]".- https://www.thebyteblog.com/enumeration-in-penetration-testing/ (tool focused)
- LinkedIn's "What is Enumeration" course (I'm putting this under read, it is a video, but I read the captions as they were done well).
- If you pay for LinkedIn, don't sleep on some of the LinkedIn learning stuff. I will go for anything over 4.5 stars.
Kinesthetic:
TryHackMe has 4 pages that hit on the term "enumeration", I pulled out 3 here as they were obviously directly about the topic.
- https://tryhackme.com/room/enumerationpe
- https://tryhackme.com/room/lle
- https://tryhackme.com/room/webenumerationv2
Disclaimer: Understanding that this industry is already filled with educational content, the writer of this blog intends for this series to be utilized by learners who are looking to find resources for said topics. The content within these resources should be used with caution and common sense, taking note to understand the applicable laws of the reader's location. This is a personal blog of which any opinions or ideas expressed are of the owner/writer and not of any association they are affiliated with. To reach the writer of this blog, please find them on LinkedIn. When sharing this content with your own community it is asked that credit be given. Before reposting as a blog, please seek permission from the author.