Week 4-1 Week 4: Enumeration What is Enumeration? –Now that you have a live target the next step is find what services are running and what version.

Slides:



Advertisements
Similar presentations
Module 4: Configuring a Client for Name Resolution
Advertisements

Ethical Hacking Module IV Enumeration.
UNIVERSITY OF EDUCATION BY H.M.ISHTIAQ RAFIQUE. Domain Name Structure.
Chapter 16. Windows Internet Name Service(WINS) Network Basic Input/Output System (NetBIOS) N etBIOS over TCP/IP (NetBT) provides commands and support.
Gathering Network & Host Information: Scanning & Enumeration.
ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ Александр Юрьевич Каргин кандидат физико-математических наук, Microsoft Certified Systems Engineer (MCSE), Microsoft Certified.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Honeypots Margaret Asami. What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while.
DirectAccess is an Enterprise Solution: No support for Windows 7 Professional Requires two consecutive public IP addresses Cannot NAT to the DirectAccess.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
Windows Enumeration Tools Roy Introduction SMB Protocol Inter Process Communication(IPC)
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Microsoft Networking.
TCP/IP.
Communication – Network Management Technologies March 2011, Barcelona, Spain SNMP TRAP HANDLING TOOLS Rashid Mijumbi.
How does it differ from footprinting and scanning? – Footprinting did not necessarily attempt to access the target system(s) directly – Scanning involved.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
Hacking Windows 2K, XP. Windows 2K, XP Review: NetBIOS name resolution. SMB - Shared Message Block - uses TCP port 139, and NBT - NetBIOS over TCP/IP.
Enumerating slides (c) 2012 by Richard Newman based on Hacking Exposed 7 by McClure, Scambray, and Kurtz.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Chapter 6 Enumeration Modified Objectives  Describe the enumeration step of security testing  Enumerate Microsoft OS targets  Enumerate NetWare.
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
Enumerating slides (c) 2012 by Richard Newman based on Hacking Exposed 7 by McClure, Scambray, and Kurtz.
Hands-On Ethical Hacking and Network Defense
Chapter 3 Enumeration Last modified
Chapter 6: Windows Servers
CS391 Computer & Network Security
Chapter 13 Microsoft DNS Server n DNS server: A Microsoft service that resolves computer names to IP addresses, such as resolving the computer name Brown.
Networking Functions of windows NT Sever
Installing and Using Active Directory Written by Marc Zacharko.
Windows routing and resolution. Basic concepts  Host name: machine.sub-domain.domain example: mail.ubalt.edu same machine name in Windows in NetBIOS.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
How to configure DNS for a Windows 2000 domain? 1.Start the Install/Remove Programs Control Panel Applet (Start - Settings - Control Panel - Add/Remove.
Remote Desktop Services in Windows Server 2008 R2.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
Windows 2000, Null Sessions and MSRPC • Todd Sabin • BlackHat Windows 2000, Feb
Chapter 3 Enumeration Last modified Definition Scanning identifies live hosts and running services Enumeration probes the identified services.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Resolving Name Resolution Problems IP Address / Host Name / NetBIOS Name.
Lab 11 Overview Windows Server Last Labs Lab 12  Cisco Firewall.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
Hacking Windows What to do first?  Patch : of course the first thing to do is apply SP3 and the critical updates. More will come …critical updates.
ROAD TO EXPLOITATION Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Enumeration After scanning for live systems and services, hackers will probe the services more carefully looking for weaknesses This involves active connections!
TCOM Information Assurance Management System Hacking.
Hands-On Ethical Hacking and Network Defense
WEEK 1 You have 10 seconds to name…
Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Modified
Announcements RSA Security Conference (extra credit) RSA Security Conference (extra credit) –April 7 through April 11, San Francisco –Visit the Forum for.
Footprinting and Scanning
CS3695/M6-109 – Network Vulnerability Assessment & Risk Mitigation–
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
11 UPGRADING AND MIGRATING TO WINDOWS SERVER 2003 Chapter 12.
Асоциация за информационна сигурност Мрежова сигурност 1 изборен курс във ФМИ на СУ понеделник, зала 325, ФМИ, 19:00 четвъртък, зала 200,
Enumeration March 2, 2010 MIS 4600 – MBA © Abdou Illia.
Lab 11 Overview Windows Server Last Labs wk14
Mitchell Adair Computer Security Group Feb. 10th, 2010 Enumerating Windows Users.
CITA 352 Chapter 6 Enumeration.
Enumeration.
Footprinting and Scanning
Calvin Wilson Craig Delzangle
“Basic Linux/UNIX Command Line”
Planning and Configuring IPv4
Kennesaw State University
Ашық сабақ 7 сынып Файлдар мен қапшықтар Сабақтың тақырыбы:
Windows басқару элементтері
Қош келдіңіздер!.
Информатика пән мұғалімі : Аитова Карима.
Presentation transcript:

Week 4-1 Week 4: Enumeration What is Enumeration? –Now that you have a live target the next step is find what services are running and what version.

Week 4-2 Week 4: Enumeration NetBios Null Sessions Null Session Countermeasures

Week 4-3 Week 4: Enumeration NetBIOS Enumeration Hacking Tool: DumpSec Hacking Tool: NAT

Week 4-4 Week 4: Enumeration SNMP Enumeration SNMPUtil Hacking Tool: IP Network Browser

Week 4-5 Week 4: Enumeration SNMP Enumeration Countermeasures Windows 2000 DNS Zone transfer Identifying Win2000 Accounts

Week 4-6 Week 4: Enumeration Hacking Tool: User2SID Hacking Tool: SID2User Hacking Tool: Enum Hacking Tool: UserInfo Hacking Tool: GetAcct

Week 4-7 Week 4: Enumeration Active Directory Enumeration

Week 4-8 Week 4: Enumeration Summary