Enumeration

Subscribe to my newsletter and never miss my upcoming articles

Listen to this article

In the earlier processes like Footprinting and Scanning, we have understood how to collect information about any organization, target website, or a particular network. We have also discussed several tools that can be helpful in collecting the general information regarding the target. Now we are moving to observe the target more closely in order to gain detailed information. This information is sensitive such as network information, network resources, routing paths, SNMP, DNS and other protocol-related information, user and group information, etc. This sensitive information is required to gain access to a system. This information is gathered by using different tools and techniques actively.

 
Share this