SlideShare a Scribd company logo
Hands-On Ethical Hacking
and Network Defense
Chapter 6
Enumeration
Modified 2-22-14
Objectives
• Describe the enumeration step of security
testing
• Enumerate Microsoft OS targets
• Enumerate NetWare OS targets
• Enumerate *NIX OS targets
Introduction to Enumeration
• Enumeration extracts information about:
• Resources or shares on the network
• User names or groups assigned on the network
• Last time user logged on
• User’s paassword
• Before enumeration, you use Port scanning and
footprinting
• To Determine OS being used
• Intrusive process
NBTscan
• NBT (NetBIOS over TCP/IP)
• is the Windows networking protocol
• used for shared folders and printers
• NBTscan
• Tool for enumerating Microsoft OSs
Enumerating Microsoft Operating
Systems
• Study OS history
• Knowing your target makes your job easier
• Many attacks that work for older
Windows OSs still work with newer
versions
Windows 95
• The first Windows version that did not start
with DOS
• Still used the DOS kernel to some extent
• Introduced the Registry database to replace
Win.ini, Autoexec.bat, and other text files
• Introduced Plug and Play and ActiveX
• Used FAT16 file system
Windows 98 and ME
• More Stable than Win 95
• Used FAT32 file system
• Win ME introduced System Restore
• Win 95, 98, and ME are collectively called
"Win 9x"
• They run Windows 98
• Use plaintext passwords
• Research from Billy K Rios, published
2-11-14
Windows NT 3.51 Server/Workstation
• No dependence on DOS kernel
• Domains and Domain Controllers
• NTFS File System to replace FAT16 and
FAT32
• Much more secure and stable than Win9x
• Many companies still use Win NT Server
Domain Controllers
• Win NT 4.0 was an upgrade
Windows 2000 Server/Professional
• Upgrade of Win NT
• Active Directory
• Powerful database storing information about
all objects in a network
• Users, printers, servers, etc.
• Based on Novell's Novell Directory Services
• Enumerating this system would include
enumerating Active Directory
Windows XP Professional
• Much more secure, especially after
Service Pack 2
• Windows File Protection
• Data Execution Prevention
• Windows Firewall
• Link Ch 6n
Windows Server 2003
• Much more secure, especially after
Service Pack 1
• Network services are closed by default
• Internet Explorer security set higher
14
Windows Vista
• User Account Control
• Users log in with low privileges for most tasks
• BitLocker Drive Encryption
• Address Space Layout Randomization
(ASLR)
• Download Process Explorer (link Ch 3e)
• View, Show Lower Pane
• View, Lower Pane View, DLLS
• View, Select Columns, DLL tab, Base
Address
• Select explorer.exe and find ntdll.dll
• Reboot to see base address change
ASLR Demo
CNIT 123: Ch 6: Enumeration
17
Windows Server 2008
• User Account Control
• BitLocker Drive Encryption
• ASLR
• Network Access Protection
• Granular levels of network access based on a clients
level of compliance with policy
• Server Core
• Small, stripped-down server, like Linux
• Hyper-V
• Virtual Machines
18
Windows 7
• XP Mode
• A virtual machine running Win XP
• User Account Control was refined and
made easier to use
Windows 8
• Built-in antivirus
• SmartScreen protects against phishing and
social engineering by using a URL and
application reputation system
• Windows 8 secure boot using EFI on ARM
prevents rootkits
Windows 8.1
• Pass the Hash finally fixed, after 15 years!
NetBIOS Basics
• Network Basic Input Output System
(NetBIOS)
• Programming interface
• Allows computer communication over a LAN
• Used to share files and printers
NetBIOS names
• Computer names on Windows systems
• Limit of 16 characters
• Last character identifies type of service
running
• Must be unique on a network
NetBIOS Suffixes
• For complete list, see link Ch 6h
NetBIOS Null Sessions
• Null session
• Unauthenticated connection to a Windows computer
• Does not use logon and passwords values
• Around for over a decade
• Still present on Windows XP
• Disabled on Server 2003
• Absent entirely in Vista and later versions
• A large vulnerability
• See links Ch 6a-f
Null Session Information
• Using these NULL connections allows
you to gather the following information
from the host:
• List of users and groups
• List of machines
• List of shares
• Users and host SIDs (Security Identifiers)
• From brown.edu (link Ch 6b)
Demonstration of Null Sessions
• Start Win 2000 Pro
• Share a folder
• From a Win XP command prompt
• NET VIEW ip-address Fails
• NET USE ip-addressIPC$ "" /u:""
• Creates the null session
• Username="" Password=""
• NET VIEW ip-address Works now
Demonstration of
Enumeration
• Download Winfo
from link Ch 6g
• Run it – see all the
information!
NULL Session Information
• NULL sessions exist in windows
networking to allow:
• Trusted domains to enumerate resources
• Computers outside the domain to authenticate
and enumerate users
• The SYSTEM account to authenticate and
enumerate resources
• NetBIOS NULL sessions are enabled by
default in Windows NT and 2000
• From brown.edu (link Ch 6b)
NULL Sessions in Win XP and 2003
Server
• Windows XP and 2003 don't allow Null
Sessions, according to link Ch 6c.
• I tried the NET USE command on Win XP SP2
and it did not work
• Link Ch 6f says you can still do it in Win XP
SP2, but you need to use a different procedure
NetBIOS Enumeration Tools
• Nbtstat command
• Powerful enumeration tool included with the
Microsoft OS
• Displays NetBIOS table
NetBIOS Enumeration Tools
• Net view command
• Shows whether there are any shared
resources on a network host
NetBIOS Enumeration Tools
(continued)
• Net use command
• Used to connect to a computer with shared
folders or files
Additional Enumeration Tools
• Windows tools included with BackTrack
• Smb4K tool
• DumpSec
• Hyena
• Nessus and OpenVAS
Using Windows Enumeration Tools
• Backtrack Smb4K tool
• Used to enumerate Windows computers in a
network
Figure 6-6 Using Smb4K on
a Windows network
DumpSec
• Enumeration tool for Windows systems
• Produced by Foundstone, Inc.
• Allows user to connect to a server and
“dump”:
• Permissions for shares
• Permissions for printers
• Permissions for the Registry
• Users in column or table format
• Policies
• Rights
• Services
Hyena
• Excellent GUI product for managing and
securing Windows OSs
• Shows shares and user logon names for
Windows servers and domain controllers
• Displays graphical representation of:
• Microsoft Terminal Services
• Microsoft Windows Network
• Web Client Network
• Find User/Group
Figure 6-8 The Hyena interface
Nessus and OpenVAS
• OpenVAS
• Operates in client/server mode
• Open-source descendent of Nessus
• Popular tool for identifying vulnerabilities
• Nessus Server and Client
• Latest version can run on Windows, Mac OS
X, FreeBSD, and most Linux distributions
• Handy when enumerating different OSs on a
large network
• Many servers in different locations
Figure 6-10 The Nessus session window
Figure 6-12 The Connection Manager dialog box
Figure 6-13 Nessus ready to scan
Figure 6-14 Nessus enumerates a NetBIOS system
Figure 6-15 Enumerating shares in Nessus
Figure 6-16 Nessus indicates the OS and service pack
Enumerating the NetWare Operating
System
• Novell NetWare
• Some security professionals see as a “dead”
OS
• Ignoring an OS can limit your career as a
security professional
• NetWare
• Novell does not offer any technical support for
versions before 6.5
Table 6-3 NetWare OS descriptions
NetWare Enumeration Tools
• NetWare 5.1
• Still used on many networks
• New vulnerabilities are discovered daily
• Vigilantly check vendor and security sites
• Example
• Older version of Nessus to scan a NetWare
5.1 server
Figure 6-17 Nessus enumerates a NetWare server
Figure 6-18 Enumerating eDirectory in Nessus
Figure 6-19 Nessus discovers the FTP account’s username and password
Figure 6-20 Nessus enumerates several user accounts
NetWare Enumeration Tools (cont’d.)
• Novell Client for Windows
• Gathers information on shares and resources
• Vulnerability in NetWare OS
• You can click Trees, Contexts, and Servers
buttons without a login name or password
• Open dialog boxes showing network information
Figure 6-22 Logging in with credentials supplied by Nessus
Figure 6-23 Information displayed after the NetWare login is accepted
Figure 6-24 Accessing NetWare through mapped drives
Enumerating the *nix Operating
System
• Several variations
• Solaris and OpenSolaris
• HP-UX
• Mac OS X and OpenDarwin
• AIX
• BSD UNIX
• FreeBSD
• OpenBSD
• NetBSD
• Linux, including several distributions
UNIX Enumeration
• Finger utility
• Most popular enumeration tool for security
testers
• Finds out who is logged in to a *nix system
• Determines who was running a process
• Nessus
• Another important *nix enumeration tool
Figure 6-25 Using the Finger command
Figure 6-26 Nessus enumerates a Linux system

More Related Content

PDF
CNIT 123: 8: Desktop and Server OS Vulnerabilites
PDF
Ch 6: Enumeration
PDF
Ch 13: Network Protection Systems
PDF
Ch 8: Desktop and Server OS Vulnerabilites
PDF
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
PDF
Ch 9: Embedded Operating Systems: The Hidden Threat
PDF
Ch 4: Footprinting and Social Engineering
PDF
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123: 8: Desktop and Server OS Vulnerabilites
Ch 6: Enumeration
Ch 13: Network Protection Systems
Ch 8: Desktop and Server OS Vulnerabilites
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden Threat
Ch 4: Footprinting and Social Engineering
CNIT 123 8: Desktop and Server OS Vulnerabilities

What's hot (20)

PDF
CNIT 123: Ch 4: Footprinting and Social Engineering
PPTX
Enumeration and system hacking
PDF
CNIT 123: Ch 7: Programming for Security Professionals
PDF
CNIT 123: Ch 13: Network Protection Systems
PDF
CNIT 123: Ch 3: Network and Computer Attacks
PDF
CNIT 121: 3 Pre-Incident Preparation
PDF
CNIT 123: 6: Enumeration
PDF
CNIT 123 Ch 8: OS Vulnerabilities
PDF
CNIT 123: Ch 3: Network and Computer Attacks
PDF
CNIT 123 12: Cryptography
PDF
CNIT 152: 1 Real-World Incidents
PDF
CNIT 152: 13 Investigating Mac OS X Systems
PDF
CNIT 121: 8 Forensic Duplication
PDF
Ch 10: Attacking Back-End Components
PPTX
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
PDF
CNIT 152 13 Investigating Mac OS X Systems
PDF
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
PDF
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
PDF
CNIT 152: 1 Real-World Incidents
PDF
CNIT 152: 9 Network Evidence
CNIT 123: Ch 4: Footprinting and Social Engineering
Enumeration and system hacking
CNIT 123: Ch 7: Programming for Security Professionals
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 121: 3 Pre-Incident Preparation
CNIT 123: 6: Enumeration
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123 12: Cryptography
CNIT 152: 1 Real-World Incidents
CNIT 152: 13 Investigating Mac OS X Systems
CNIT 121: 8 Forensic Duplication
Ch 10: Attacking Back-End Components
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
CNIT 152 13 Investigating Mac OS X Systems
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 152: 1 Real-World Incidents
CNIT 152: 9 Network Evidence
Ad

Viewers also liked (15)

PDF
Beyond 'neutrality' - how to reconnect regulation to reality?
PPT
Module 4 Enumeration
PPSX
Intro. to Linguistics_10 Lexicology
PDF
CISSP Prep: Ch 6. Identity and Access Management
PDF
CISSP Prep: Ch 4. Security Engineering (Part 1)
PPTX
Net neutrality
PPT
Enumeration
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PDF
CISSP Prep: Ch 7. Security Assessment and Testing
PDF
CISSP Prep: Ch 3. Asset Security
PDF
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
PPTX
Net neutrality explained
PPTX
Introduction to Penetration Testing
PPTX
Methods of Paragraph Development
PPTX
Phonetics & phonology (The way Vowels and Consonant of English are articulated)
Beyond 'neutrality' - how to reconnect regulation to reality?
Module 4 Enumeration
Intro. to Linguistics_10 Lexicology
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 4. Security Engineering (Part 1)
Net neutrality
Enumeration
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
Net neutrality explained
Introduction to Penetration Testing
Methods of Paragraph Development
Phonetics & phonology (The way Vowels and Consonant of English are articulated)
Ad

Similar to CNIT 123: Ch 6: Enumeration (20)

PDF
Ceh v5 module 04 enumeration
PPT
Ch06.ppt
PDF
File000125
PPT
cyber forensics-enum,sniffing,malware threat.ppt
PPTX
Week 8 IT infrastructure Scanning and Enumeration Part 2.pptx
PPTX
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
PDF
Ceh v8 labs module 04 enumeration
PPT
ch11.ppt
PPT
Class Presentation
DOC
To Get To The Command Prompt In Windows Xp Go To
PPTX
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
PPT
Microsoft Operating System Vulnerabilities
PPT
Microsoft OS Vulnerabilities
PPT
Ch08 Microsoft Operating System Vulnerabilities
PPT
kuo-slides la seguridad de firewall ayuda a impedir q los hackers y el malwar...
PDF
File000173
PPT
Ceh v5 module 04 enumeration
Ch06.ppt
File000125
cyber forensics-enum,sniffing,malware threat.ppt
Week 8 IT infrastructure Scanning and Enumeration Part 2.pptx
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Ceh v8 labs module 04 enumeration
ch11.ppt
Class Presentation
To Get To The Command Prompt In Windows Xp Go To
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Microsoft Operating System Vulnerabilities
Microsoft OS Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
kuo-slides la seguridad de firewall ayuda a impedir q los hackers y el malwar...
File000173

More from Sam Bowne (20)

PDF
Introduction to the Class & CISSP Certification
PDF
Cyberwar
PDF
3: DNS vulnerabilities
PDF
8. Software Development Security
PDF
4 Mapping the Application
PDF
3. Attacking iOS Applications (Part 2)
PDF
12 Elliptic Curves
PDF
11. Diffie-Hellman
PDF
2a Analyzing iOS Apps Part 1
PDF
9 Writing Secure Android Applications
PDF
12 Investigating Windows Systems (Part 2 of 3)
PDF
10 RSA
PDF
12 Investigating Windows Systems (Part 1 of 3
PDF
9. Hard Problems
PDF
8 Android Implementation Issues (Part 1)
PDF
11 Analysis Methodology
PDF
8. Authenticated Encryption
PDF
7. Attacking Android Applications (Part 2)
PDF
7. Attacking Android Applications (Part 1)
PDF
5. Stream Ciphers
Introduction to the Class & CISSP Certification
Cyberwar
3: DNS vulnerabilities
8. Software Development Security
4 Mapping the Application
3. Attacking iOS Applications (Part 2)
12 Elliptic Curves
11. Diffie-Hellman
2a Analyzing iOS Apps Part 1
9 Writing Secure Android Applications
12 Investigating Windows Systems (Part 2 of 3)
10 RSA
12 Investigating Windows Systems (Part 1 of 3
9. Hard Problems
8 Android Implementation Issues (Part 1)
11 Analysis Methodology
8. Authenticated Encryption
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 1)
5. Stream Ciphers

Recently uploaded (20)

PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Empowerment Technology for Senior High School Guide
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
IGGE1 Understanding the Self1234567891011
PDF
RMMM.pdf make it easy to upload and study
PDF
Trump Administration's workforce development strategy
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Cell Types and Its function , kingdom of life
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Classroom Observation Tools for Teachers
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Empowerment Technology for Senior High School Guide
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
SOIL: Factor, Horizon, Process, Classification, Degradation, Conservation
Final Presentation General Medicine 03-08-2024.pptx
Complications of Minimal Access Surgery at WLH
IGGE1 Understanding the Self1234567891011
RMMM.pdf make it easy to upload and study
Trump Administration's workforce development strategy
Weekly quiz Compilation Jan -July 25.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Cell Types and Its function , kingdom of life
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Indian roads congress 037 - 2012 Flexible pavement
Classroom Observation Tools for Teachers
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

CNIT 123: Ch 6: Enumeration

  • 1. Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Modified 2-22-14
  • 2. Objectives • Describe the enumeration step of security testing • Enumerate Microsoft OS targets • Enumerate NetWare OS targets • Enumerate *NIX OS targets
  • 3. Introduction to Enumeration • Enumeration extracts information about: • Resources or shares on the network • User names or groups assigned on the network • Last time user logged on • User’s paassword • Before enumeration, you use Port scanning and footprinting • To Determine OS being used • Intrusive process
  • 4. NBTscan • NBT (NetBIOS over TCP/IP) • is the Windows networking protocol • used for shared folders and printers • NBTscan • Tool for enumerating Microsoft OSs
  • 5. Enumerating Microsoft Operating Systems • Study OS history • Knowing your target makes your job easier • Many attacks that work for older Windows OSs still work with newer versions
  • 6. Windows 95 • The first Windows version that did not start with DOS • Still used the DOS kernel to some extent • Introduced the Registry database to replace Win.ini, Autoexec.bat, and other text files • Introduced Plug and Play and ActiveX • Used FAT16 file system
  • 7. Windows 98 and ME • More Stable than Win 95 • Used FAT32 file system • Win ME introduced System Restore • Win 95, 98, and ME are collectively called "Win 9x"
  • 8. • They run Windows 98 • Use plaintext passwords • Research from Billy K Rios, published 2-11-14
  • 9. Windows NT 3.51 Server/Workstation • No dependence on DOS kernel • Domains and Domain Controllers • NTFS File System to replace FAT16 and FAT32 • Much more secure and stable than Win9x • Many companies still use Win NT Server Domain Controllers • Win NT 4.0 was an upgrade
  • 10. Windows 2000 Server/Professional • Upgrade of Win NT • Active Directory • Powerful database storing information about all objects in a network • Users, printers, servers, etc. • Based on Novell's Novell Directory Services • Enumerating this system would include enumerating Active Directory
  • 11. Windows XP Professional • Much more secure, especially after Service Pack 2 • Windows File Protection • Data Execution Prevention • Windows Firewall
  • 13. Windows Server 2003 • Much more secure, especially after Service Pack 1 • Network services are closed by default • Internet Explorer security set higher
  • 14. 14 Windows Vista • User Account Control • Users log in with low privileges for most tasks • BitLocker Drive Encryption • Address Space Layout Randomization (ASLR)
  • 15. • Download Process Explorer (link Ch 3e) • View, Show Lower Pane • View, Lower Pane View, DLLS • View, Select Columns, DLL tab, Base Address • Select explorer.exe and find ntdll.dll • Reboot to see base address change ASLR Demo
  • 17. 17 Windows Server 2008 • User Account Control • BitLocker Drive Encryption • ASLR • Network Access Protection • Granular levels of network access based on a clients level of compliance with policy • Server Core • Small, stripped-down server, like Linux • Hyper-V • Virtual Machines
  • 18. 18 Windows 7 • XP Mode • A virtual machine running Win XP • User Account Control was refined and made easier to use
  • 19. Windows 8 • Built-in antivirus • SmartScreen protects against phishing and social engineering by using a URL and application reputation system • Windows 8 secure boot using EFI on ARM prevents rootkits
  • 20. Windows 8.1 • Pass the Hash finally fixed, after 15 years!
  • 21. NetBIOS Basics • Network Basic Input Output System (NetBIOS) • Programming interface • Allows computer communication over a LAN • Used to share files and printers
  • 22. NetBIOS names • Computer names on Windows systems • Limit of 16 characters • Last character identifies type of service running • Must be unique on a network
  • 23. NetBIOS Suffixes • For complete list, see link Ch 6h
  • 24. NetBIOS Null Sessions • Null session • Unauthenticated connection to a Windows computer • Does not use logon and passwords values • Around for over a decade • Still present on Windows XP • Disabled on Server 2003 • Absent entirely in Vista and later versions • A large vulnerability • See links Ch 6a-f
  • 25. Null Session Information • Using these NULL connections allows you to gather the following information from the host: • List of users and groups • List of machines • List of shares • Users and host SIDs (Security Identifiers) • From brown.edu (link Ch 6b)
  • 26. Demonstration of Null Sessions • Start Win 2000 Pro • Share a folder • From a Win XP command prompt • NET VIEW ip-address Fails • NET USE ip-addressIPC$ "" /u:"" • Creates the null session • Username="" Password="" • NET VIEW ip-address Works now
  • 27. Demonstration of Enumeration • Download Winfo from link Ch 6g • Run it – see all the information!
  • 28. NULL Session Information • NULL sessions exist in windows networking to allow: • Trusted domains to enumerate resources • Computers outside the domain to authenticate and enumerate users • The SYSTEM account to authenticate and enumerate resources • NetBIOS NULL sessions are enabled by default in Windows NT and 2000 • From brown.edu (link Ch 6b)
  • 29. NULL Sessions in Win XP and 2003 Server • Windows XP and 2003 don't allow Null Sessions, according to link Ch 6c. • I tried the NET USE command on Win XP SP2 and it did not work • Link Ch 6f says you can still do it in Win XP SP2, but you need to use a different procedure
  • 30. NetBIOS Enumeration Tools • Nbtstat command • Powerful enumeration tool included with the Microsoft OS • Displays NetBIOS table
  • 31. NetBIOS Enumeration Tools • Net view command • Shows whether there are any shared resources on a network host
  • 32. NetBIOS Enumeration Tools (continued) • Net use command • Used to connect to a computer with shared folders or files
  • 33. Additional Enumeration Tools • Windows tools included with BackTrack • Smb4K tool • DumpSec • Hyena • Nessus and OpenVAS
  • 34. Using Windows Enumeration Tools • Backtrack Smb4K tool • Used to enumerate Windows computers in a network Figure 6-6 Using Smb4K on a Windows network
  • 35. DumpSec • Enumeration tool for Windows systems • Produced by Foundstone, Inc. • Allows user to connect to a server and “dump”: • Permissions for shares • Permissions for printers • Permissions for the Registry • Users in column or table format • Policies • Rights • Services
  • 36. Hyena • Excellent GUI product for managing and securing Windows OSs • Shows shares and user logon names for Windows servers and domain controllers • Displays graphical representation of: • Microsoft Terminal Services • Microsoft Windows Network • Web Client Network • Find User/Group
  • 37. Figure 6-8 The Hyena interface
  • 38. Nessus and OpenVAS • OpenVAS • Operates in client/server mode • Open-source descendent of Nessus • Popular tool for identifying vulnerabilities • Nessus Server and Client • Latest version can run on Windows, Mac OS X, FreeBSD, and most Linux distributions • Handy when enumerating different OSs on a large network • Many servers in different locations
  • 39. Figure 6-10 The Nessus session window
  • 40. Figure 6-12 The Connection Manager dialog box
  • 41. Figure 6-13 Nessus ready to scan
  • 42. Figure 6-14 Nessus enumerates a NetBIOS system
  • 43. Figure 6-15 Enumerating shares in Nessus
  • 44. Figure 6-16 Nessus indicates the OS and service pack
  • 45. Enumerating the NetWare Operating System • Novell NetWare • Some security professionals see as a “dead” OS • Ignoring an OS can limit your career as a security professional • NetWare • Novell does not offer any technical support for versions before 6.5
  • 46. Table 6-3 NetWare OS descriptions
  • 47. NetWare Enumeration Tools • NetWare 5.1 • Still used on many networks • New vulnerabilities are discovered daily • Vigilantly check vendor and security sites • Example • Older version of Nessus to scan a NetWare 5.1 server
  • 48. Figure 6-17 Nessus enumerates a NetWare server
  • 49. Figure 6-18 Enumerating eDirectory in Nessus
  • 50. Figure 6-19 Nessus discovers the FTP account’s username and password
  • 51. Figure 6-20 Nessus enumerates several user accounts
  • 52. NetWare Enumeration Tools (cont’d.) • Novell Client for Windows • Gathers information on shares and resources • Vulnerability in NetWare OS • You can click Trees, Contexts, and Servers buttons without a login name or password • Open dialog boxes showing network information
  • 53. Figure 6-22 Logging in with credentials supplied by Nessus
  • 54. Figure 6-23 Information displayed after the NetWare login is accepted
  • 55. Figure 6-24 Accessing NetWare through mapped drives
  • 56. Enumerating the *nix Operating System • Several variations • Solaris and OpenSolaris • HP-UX • Mac OS X and OpenDarwin • AIX • BSD UNIX • FreeBSD • OpenBSD • NetBSD • Linux, including several distributions
  • 57. UNIX Enumeration • Finger utility • Most popular enumeration tool for security testers • Finds out who is logged in to a *nix system • Determines who was running a process • Nessus • Another important *nix enumeration tool
  • 58. Figure 6-25 Using the Finger command
  • 59. Figure 6-26 Nessus enumerates a Linux system