Enumeration
The process of gathering information about a system, such as usernames and shares, during penetration testing.
Understanding Enumeration
Enumeration follows footprinting and reconnaissance in the cyberattack lifecycle. Attackers use active probing techniques to interact with the target and retrieve system details.
Key Features of Enumeration
Extracts Sensitive Information – Identifies user accounts, network shares, and services.
Used in Cyberattacks & Security Assessments – Helps attackers and security professionals understand attack surfaces.
Relies on Common Protocols – Includes SNMP, NetBIOS, LDAP, and SMB enumeration.
Best Practices for Enumeration Prevention
1. Restrict Information Disclosure in Network Services
Disable unnecessary network protocols and services.
2. Enforce Strong Authentication & Least Privilege
Prevent unauthorized access to sensitive directories and accounts.
3. Monitor and Detect Active Probing Attempts
Use intrusion detection systems (IDS) to flag enumeration activities.