SlideShare a Scribd company logo
MODULE 4 ENUMERATION
Objective Overview of System Hacking Cycle Enumeration Techniques for Enumeration Establishing Null Session Enumerating User Accounts Null User Countermeasures SNMP Scan SNMP Enumeration MIB SNMP Util Example SNMP Enumeration Countermeasures Active Directory Enumeration AD Enumeration Countermeasures
Overview of System Hacking Cycle
What is Enumeration? Enumeration is defined as extraction of user names, machine names, network resources, shares, and services Enumeration techniques are conducted in an intranet environment Enumeration involves active connections to systems and directed queries The type of information enumerated by intruders: Network resources and shares Users and groups Applications and banners Auditing settings
Techniques for Enumeration Some of the techniques for enumeration are: Extract user names using Win2k enumeration Extract user names using SNMP Extract user names using email IDs Extract information using default passwords Brute force Active Directory
Netbios Null Sessions The null session is often refereed to as the Holy Grail of Windows hacking. Null sessions take advantage of flaws in the CIFS/SMB (Common Internet File System/Server Messaging Block) You can establish a null session with a Windows (NT/2000/XP) host by logging on with a null user name and password Using these null connections allows you to gather the following information from the host: List of users and groups List of machines List of shares Users and host SIDs (Security Identifiers)
So What's the Big Deal? Anyone with a NetBIOS connection to your computer can easily get a full dump of all your user names, groups, shares, permissions, policies, services, and more using the null user. The attacker now has a channel over which to attempt various techniques. The CIFS/SMB and NetBIOS standards in Windows 2000 include APIs that return rich information about a machine via TCP port 139—even to unauthenticated users. This works on Windows 2000/XP systems, but not on Win 2003 The following syntax connects to the hidden Inter Process Communication 'share' (IPC$) at IP address 192.34.34.2 with the built-in anonymous user (/u:'''') with a ('''') null password
Tool: DumpSec  www.systemtools.com/somarsoft/ DumpSec reveals shares over a null session with the target computer. It allows users to remotely connect to any computer and dump permissions, audit settings, and ownership for the Windows NT/2000 file system. Hackers can choose to dump either NTFS or share permissions. It can also dump permissions for printers and the registry
NetBIOS Enumeration Using Netview
Nbtstat Enumeration Tool
NBTScan http:// www.inetcat.org/software/nbtscan.html . NBTscan is a program for scanning IP networks for NetBIOS name information. It sends NetBIOS status query to each address in supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address. NBTscan uses port 137 UDP for sending queries.
Hacking Tool: GetAcct GetAcct sidesteps "RestrictAnonymous=1" and acquires account information on Windows NT/2000 machines.  Downloadable from (www.securityfriday.com)
Null Session Countermeasure Null sessions require access to TCP 139 and/ or TCP 445 ports. You could also disable SMB services entirely on individual hosts by unbinding WINS Client TCP/IP from the interface. Edit the registry to restrict the anonymous user. 1. Open regedt32, navigate to HKLM\SYSTEM\CurrentControlSet\LSA 2. Choose edit | add value value name: ResticAnonymous Data Type: REG_WORD Value: 2
PS Tools PS Tools was developed by Mark Russinovich of SysInternals, and contains a collection of enumeration tools. Some of the tools require user authentication to the system: PsExec  - Executes processes remotely PsFile  - Shows files opened remotely PsGetSid  - Displays the SID of a computer or a user PsKill  - Kills processes by name or process ID PsInfo  - Lists information about a system PsList  - Lists detailed information about processes PsLoggedOn  - Shows who's logged on locally and via resource sharing PsLogList  - Dumps event log records PsPasswd  - Changes account passwords PsService  - Views and controls services PsShutdown  - Shuts down and optionally reboots a computer PsSuspend  - Suspends processes PsUptime  - Shows how long a system has been running since its last reboot
UNIX Enumeration Commands used to enumerate Unix network resources are as follows: showmount: –  Finds the shared directories on the machine –  [root $] showmount –e 19x.16x. xxx.xx Finger: –  Enumerates the user and host –  Enables you to view the user’s home directory, login time, idle times, office location, and the last time they both received or read mail –  [root$] finger –1 @target.hackme.com rpcinfo: –  Helps to enumerate Remote Procedure Call protocol –  RPC protocol allows applications to talk to one another over the network –  [root] rpcinfo –p 19x.16x.xxx.xx
Tool: Winfingerprint Winfingerprint is GUIbased. It has the option of scanning a single host or a continuous network block Has two main windows: IP address range Windows options
Enumerate Systems Using Default Passwords
http://www.defaultpassword.com

More Related Content

PPTX
Enumeration and system hacking
PPTX
Packet sniffing
PDF
Footprinting
PPTX
System hacking
 
PPTX
Intrusion detection
 
PPTX
Brute force-attack presentation
PDF
Kablosuz Ağ Saldırı Araçları
PPTX
Metasploit framwork
Enumeration and system hacking
Packet sniffing
Footprinting
System hacking
 
Intrusion detection
 
Brute force-attack presentation
Kablosuz Ağ Saldırı Araçları
Metasploit framwork

What's hot (20)

PPTX
Reconnaissance - For pentesting and user awareness
PPTX
Vulnerability assessment and penetration testing
PPTX
Session Hijacking ppt
PPTX
Introduction to penetration testing
PPTX
Botnets
PPT
Sql injection
PPT
Intrusion detection system ppt
PPTX
I hunt sys admins 2.0
PPTX
PDF
Brute Force Attack Security Use Case Guide
PDF
Ceh v5 module 04 enumeration
PPTX
PDF
Ceh v5 module 03 scanning
PPTX
Computer security concepts
PPT
Introduction to SSH
PPTX
Man in the middle attack .pptx
PPTX
Windows Forensic 101
PPTX
STORED XSS IN DVWA
PDF
Nessus Software
Reconnaissance - For pentesting and user awareness
Vulnerability assessment and penetration testing
Session Hijacking ppt
Introduction to penetration testing
Botnets
Sql injection
Intrusion detection system ppt
I hunt sys admins 2.0
Brute Force Attack Security Use Case Guide
Ceh v5 module 04 enumeration
Ceh v5 module 03 scanning
Computer security concepts
Introduction to SSH
Man in the middle attack .pptx
Windows Forensic 101
STORED XSS IN DVWA
Nessus Software
Ad

Viewers also liked (20)

PPTX
Writing Identification Tests
PDF
Beyond 'neutrality' - how to reconnect regulation to reality?
PDF
CNIT 123: Ch 6: Enumeration
PPSX
6 enumerated, typedef
PDF
15 1. enumeration, typedef
PDF
Cehv8 - Module 05: System Hacking
PPSX
Intro. to Linguistics_10 Lexicology
PPTX
Net neutrality
PDF
Ceh v5 module 05 system hacking
PPT
Enumeration
PPTX
MS Access teaching powerpoint tasks
PPTX
Net neutrality explained
PPT
Module 2 Foot Printing
PPT
Essay type tests
DOCX
Test type questions
PPTX
Methods of Paragraph Development
PPT
Essays
PPTX
8 essay test
PPTX
Principles of Test Construction 1
PPTX
Essay type test
Writing Identification Tests
Beyond 'neutrality' - how to reconnect regulation to reality?
CNIT 123: Ch 6: Enumeration
6 enumerated, typedef
15 1. enumeration, typedef
Cehv8 - Module 05: System Hacking
Intro. to Linguistics_10 Lexicology
Net neutrality
Ceh v5 module 05 system hacking
Enumeration
MS Access teaching powerpoint tasks
Net neutrality explained
Module 2 Foot Printing
Essay type tests
Test type questions
Methods of Paragraph Development
Essays
8 essay test
Principles of Test Construction 1
Essay type test
Ad

Similar to Module 4 Enumeration (20)

PPT
Ch06.ppt
PDF
CNIT 123: 6: Enumeration
PPTX
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
PDF
Ch 6: Enumeration
PPTX
Week 8 IT infrastructure Scanning and Enumeration Part 2.pptx
PPT
cyber forensics-enum,sniffing,malware threat.ppt
PDF
File000125
PPT
Intro To Hacking
PDF
Ceh v8 labs module 04 enumeration
PDF
File000174
PDF
Ceh v8 labs module 04 enumeration
PDF
eCPPeeeefeewfwefwfwefwfeeeeeeeeeeeeeeT.pdf
PDF
Ethical hacking mind map
PDF
Introduction to Windows Dictionary Attacks
DOCX
Dos command for hackers
DOCX
Command line
PPTX
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Ch06.ppt
CNIT 123: 6: Enumeration
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ch 6: Enumeration
Week 8 IT infrastructure Scanning and Enumeration Part 2.pptx
cyber forensics-enum,sniffing,malware threat.ppt
File000125
Intro To Hacking
Ceh v8 labs module 04 enumeration
File000174
Ceh v8 labs module 04 enumeration
eCPPeeeefeewfwefwfwefwfeeeeeeeeeeeeeeT.pdf
Ethical hacking mind map
Introduction to Windows Dictionary Attacks
Dos command for hackers
Command line
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"

More from leminhvuong (20)

PPTX
PPT
Lession2 Xinetd
PPT
Module 7 Sql Injection
PPT
Iptables
PPT
Lession1 Linux Preview
PPT
PPT
PPT
Net Admin Intro
PPT
Lession4 Dhcp
PPT
Lession3 Routing
PPT
Module 1 Introduction
PPT
Wire Less
PPT
Net Security Intro
PPT
Module 10 Physical Security
PPT
Module 9 Dos
PPT
Module 8 System Hacking
PPT
Module 6 Session Hijacking
PPT
Module 5 Sniffers
PPT
Module 3 Scanning
PPT
Call Back
Lession2 Xinetd
Module 7 Sql Injection
Iptables
Lession1 Linux Preview
Net Admin Intro
Lession4 Dhcp
Lession3 Routing
Module 1 Introduction
Wire Less
Net Security Intro
Module 10 Physical Security
Module 9 Dos
Module 8 System Hacking
Module 6 Session Hijacking
Module 5 Sniffers
Module 3 Scanning
Call Back

Recently uploaded (20)

PPTX
Machine Learning_overview_presentation.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
August Patch Tuesday
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Machine learning based COVID-19 study performance prediction
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPT
Teaching material agriculture food technology
PPTX
cloud_computing_Infrastucture_as_cloud_p
Machine Learning_overview_presentation.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Digital-Transformation-Roadmap-for-Companies.pptx
Spectroscopy.pptx food analysis technology
Accuracy of neural networks in brain wave diagnosis of schizophrenia
August Patch Tuesday
Unlocking AI with Model Context Protocol (MCP)
Univ-Connecticut-ChatGPT-Presentaion.pdf
Getting Started with Data Integration: FME Form 101
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25-Week II
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
Heart disease approach using modified random forest and particle swarm optimi...
Teaching material agriculture food technology
cloud_computing_Infrastucture_as_cloud_p

Module 4 Enumeration

  • 2. Objective Overview of System Hacking Cycle Enumeration Techniques for Enumeration Establishing Null Session Enumerating User Accounts Null User Countermeasures SNMP Scan SNMP Enumeration MIB SNMP Util Example SNMP Enumeration Countermeasures Active Directory Enumeration AD Enumeration Countermeasures
  • 3. Overview of System Hacking Cycle
  • 4. What is Enumeration? Enumeration is defined as extraction of user names, machine names, network resources, shares, and services Enumeration techniques are conducted in an intranet environment Enumeration involves active connections to systems and directed queries The type of information enumerated by intruders: Network resources and shares Users and groups Applications and banners Auditing settings
  • 5. Techniques for Enumeration Some of the techniques for enumeration are: Extract user names using Win2k enumeration Extract user names using SNMP Extract user names using email IDs Extract information using default passwords Brute force Active Directory
  • 6. Netbios Null Sessions The null session is often refereed to as the Holy Grail of Windows hacking. Null sessions take advantage of flaws in the CIFS/SMB (Common Internet File System/Server Messaging Block) You can establish a null session with a Windows (NT/2000/XP) host by logging on with a null user name and password Using these null connections allows you to gather the following information from the host: List of users and groups List of machines List of shares Users and host SIDs (Security Identifiers)
  • 7. So What's the Big Deal? Anyone with a NetBIOS connection to your computer can easily get a full dump of all your user names, groups, shares, permissions, policies, services, and more using the null user. The attacker now has a channel over which to attempt various techniques. The CIFS/SMB and NetBIOS standards in Windows 2000 include APIs that return rich information about a machine via TCP port 139—even to unauthenticated users. This works on Windows 2000/XP systems, but not on Win 2003 The following syntax connects to the hidden Inter Process Communication 'share' (IPC$) at IP address 192.34.34.2 with the built-in anonymous user (/u:'''') with a ('''') null password
  • 8. Tool: DumpSec www.systemtools.com/somarsoft/ DumpSec reveals shares over a null session with the target computer. It allows users to remotely connect to any computer and dump permissions, audit settings, and ownership for the Windows NT/2000 file system. Hackers can choose to dump either NTFS or share permissions. It can also dump permissions for printers and the registry
  • 11. NBTScan http:// www.inetcat.org/software/nbtscan.html . NBTscan is a program for scanning IP networks for NetBIOS name information. It sends NetBIOS status query to each address in supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address. NBTscan uses port 137 UDP for sending queries.
  • 12. Hacking Tool: GetAcct GetAcct sidesteps "RestrictAnonymous=1" and acquires account information on Windows NT/2000 machines. Downloadable from (www.securityfriday.com)
  • 13. Null Session Countermeasure Null sessions require access to TCP 139 and/ or TCP 445 ports. You could also disable SMB services entirely on individual hosts by unbinding WINS Client TCP/IP from the interface. Edit the registry to restrict the anonymous user. 1. Open regedt32, navigate to HKLM\SYSTEM\CurrentControlSet\LSA 2. Choose edit | add value value name: ResticAnonymous Data Type: REG_WORD Value: 2
  • 14. PS Tools PS Tools was developed by Mark Russinovich of SysInternals, and contains a collection of enumeration tools. Some of the tools require user authentication to the system: PsExec - Executes processes remotely PsFile - Shows files opened remotely PsGetSid - Displays the SID of a computer or a user PsKill - Kills processes by name or process ID PsInfo - Lists information about a system PsList - Lists detailed information about processes PsLoggedOn - Shows who's logged on locally and via resource sharing PsLogList - Dumps event log records PsPasswd - Changes account passwords PsService - Views and controls services PsShutdown - Shuts down and optionally reboots a computer PsSuspend - Suspends processes PsUptime - Shows how long a system has been running since its last reboot
  • 15. UNIX Enumeration Commands used to enumerate Unix network resources are as follows: showmount: – Finds the shared directories on the machine – [root $] showmount –e 19x.16x. xxx.xx Finger: – Enumerates the user and host – Enables you to view the user’s home directory, login time, idle times, office location, and the last time they both received or read mail – [root$] finger –1 @target.hackme.com rpcinfo: – Helps to enumerate Remote Procedure Call protocol – RPC protocol allows applications to talk to one another over the network – [root] rpcinfo –p 19x.16x.xxx.xx
  • 16. Tool: Winfingerprint Winfingerprint is GUIbased. It has the option of scanning a single host or a continuous network block Has two main windows: IP address range Windows options
  • 17. Enumerate Systems Using Default Passwords