Enumeration helps identify a user account or system account for potential use in hacking the target system.
- It isn’t necessary to find a system administrator account, because most account privileges can be escalated to allow the account more access than was previously granted.
- Enumeration involves active connections to systems and directed queries.
- The type of information enumerated by intruders:
* Network resources and shares
* Users and groups
* Applications and banners
No comments:
Post a Comment