Attacker creates active connections to system and performs directed queries to gain more information about the target,Attackers use extracted information to identify system attack points and perform password attacks to gain unauthorized access to information system resources,enumeration techniques are conducted in a intranet environment.

Attacker creates active connections to system and performs directed queries to gain more information about the target,Attackers use extracted information to identify system attack points and perform password attacks to gain unauthorized access to information system resources,enumeration techniques are conducted in a intranet environment.

NetBios Enumeration

NetBIOS name is a unique 16 ASCII character string used to identify the network devices over TCP/IP 15 characters is reserved for the service or name record type

Nbstat displays NetBIOS over TCP/IP protocol statistics,netbios name tables for both local computer and remote computers and the netbios name cache

Attacker creates active connections to system and performs directed queries to gain more information about the target,Attackers use extracted information to identify system attack points and perform password attacks to gain unauthorized access to information system resources,enumeration techniques are conducted in a intranet environment.


NetBIOS Enumeration Tool: SuperScan

Superscan is a connect based TCP scanner,pinger, and hostname resolver

NetBIOS Enumeration Tool:Hyena

Hyena is a GUI product for managing and securing microsoft operating system.

It displays graphical representation of microsoft terminal services ,webclient network,etc,.

NetBIOS Enumeration Tool: Winfingerprint

Winfingerprint determine the os, enumerate the users,groups,shares,sids,trnasports,sessions services,service pack and hotfix levelmdate time disks and open tcp and udp ports 



Enumerate systems using Default Passwords

Devices like switches,hubs,routers,access points might still be enabled with a default passwords

Attack gain unauthorized access to the organization computer network  and information resources and common passwords.

Post a Comment

Thank you for visiting Afridi's Technoworld

 
Top