User Enumeration
User Enumeration in the enumeration phase attacker creates and performs activities connections to system and perms directed queries to gain more information about the taget
attackers use extracted information to identify system attack point and perform password attacks to gain unauthorized access to information system resources.

Enumeration pen testing
Enumeration Pen Testing in order to enumerate important servers find the network range using tools such as “whoise lookup”
calculate the subnet mask required for the ip range using subnet mask calculators that can be given as an input to many of the ping sweep and port scanning tools
Comments
Post a Comment