Enumeration is the process of extracting usernames, machine names, network resources, shares, and services from a system. Enumeration techniques are conducted in an intranet environment.
The objective of this lab is to provide expert knowledge on network enumeration and other responsibilities that include:
Username and user groups
Lists of computers, their operating systems, and ports
Machine names, network resources, and services
Lists of shares on individual hosts on the network
Policies and passwords
Penetration testing is much more than just running exploits against vulnerable systems like we learned in the previous module. In fact, a penetration test begins before penetration testers have even made contact with the victim systems.
As a security expert and penetration tester, you must know how to enumerate target networks and extract lists of computers, user names, user groups, ports, operating systems, machine names, network resources, and services using various enumeration techniques.